28.10.2014 Views

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Blind <strong>SQL</strong> <strong>Injection</strong> Exploitation • Chapter 5 269<br />

˛˛ <strong>SQL</strong>Brute is the tool for comm<strong>and</strong>-line users who have a fixed vulnerability they<br />

wish to exploit using either time- or response-based inference.<br />

˛˛ Sqlninja, among a number of features, supports a DNS-based alternative channel for<br />

remote comm<strong>and</strong> execution that works by first uploading a custom binary wrapper<br />

<strong>and</strong> then executing the comm<strong>and</strong> via the uploaded wrapper. The wrapper captures<br />

all output from the comm<strong>and</strong> <strong>and</strong> initiates a sequence of DNS requests containing<br />

the encoded output.<br />

˛˛ Squeeza takes a different look at <strong>SQL</strong> injection, splitting data creation from data<br />

extraction. This comm<strong>and</strong>-line tool can extract time through time-based inference,<br />

classic errors, or DNS. The DNS channel is performed entirely through T-<strong>SQL</strong>, <strong>and</strong><br />

thus does not require an uploaded binary.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!