28.10.2014 Views

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

212 Chapter 4 • Exploiting <strong>SQL</strong> <strong>Injection</strong><br />

Figure 4.18 Screenshot of Bobcat<br />

B<strong>SQL</strong><br />

Another very promising tool for Windows boxes is B<strong>SQL</strong>, developed by Ferruh Mavituna<br />

<strong>and</strong> available at http://code.google.com/p/bsqlhacker/. Even though it was still in beta at the<br />

time of this writing, it performed extremely well according to the OWASP <strong>SQL</strong>iBENCH<br />

project, a benchmarking project of automatic <strong>SQL</strong> injectors that perform data extraction<br />

(http://code.google.com/p/sqlibench/), <strong>and</strong> therefore already deserves mention.<br />

B<strong>SQL</strong> is released under the GPLv2, works on any Windows machine with .NET<br />

Framework 2 installed, <strong>and</strong> comes with an automated installer. It supports error-based<br />

injection <strong>and</strong> blind injection <strong>and</strong> offers the possibility of using an interesting alternative<br />

approach to time-based injection, where different timeouts are used depending on the<br />

value of the character to extract so that more than one bit can be extracted with each<br />

request. The technique, which the author dubbed “deep blind injection,” is described in<br />

detail in a paper that you can download from http://labs.portcullis.co.uk/download/<br />

Deep_Blind_<strong>SQL</strong>_<strong>Injection</strong>.pdf.<br />

B<strong>SQL</strong> can find <strong>SQL</strong> injection vulnerabilities <strong>and</strong> extract information from the<br />

following databases:<br />

■■<br />

■■<br />

■■<br />

Oracle<br />

<strong>SQL</strong> Server<br />

My<strong>SQL</strong><br />

Figure 4.19 shows an example screenshot of an ongoing B<strong>SQL</strong> attack.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!