28.10.2014 Views

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Executing Operating System Comm<strong>and</strong>s<br />

Exploiting the Operating System • Chapter 6 313<br />

˛˛ In My<strong>SQL</strong>, although you can execute operating system comm<strong>and</strong>s through <strong>SQL</strong><br />

by creating a user-defined function (UDF), I am unaware of any method to<br />

accomplish this currently via <strong>SQL</strong> injection.<br />

˛˛ In Microsoft <strong>SQL</strong> Server, you can execute comm<strong>and</strong>s via stored procedures such as<br />

xp_cmdshell, via OLE Automation, or through the new CLR integration features.<br />

˛˛ In Oracle, you can execute comm<strong>and</strong>s through EXTPROC, Java,<br />

DBMS_SCHEDULER, or PL/<strong>SQL</strong> functionality.<br />

Consolidating Access<br />

˛˛ You can use database rootkits to ensure repeat access to compromised servers.<br />

˛˛ Database Rootkits can vary in complexity, from adding functionality to the database<br />

server to simply adding users to the system who do not show up with regular<br />

detection.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!