28.10.2014 Views

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Endnotes<br />

Exploiting the Operating System • Chapter 6 315<br />

1. Balaji Rathakrishnan et al. “Using CLR Integration in <strong>SQL</strong> Server 2005.” Microsoft<br />

Corporation, http://msdn.microsoft.com/en-us/library/ms345136.aspx (accessed<br />

February 12, <strong>2009</strong>).<br />

2. {}, <strong>and</strong> Hardbeat. “How we defaced www.apache.org.” http://www.dataloss.net/papers/<br />

how.defaced.apache.org.txt (accessed February 12, <strong>2009</strong>).<br />

3. Foller, Antonin. “Custom xp_cmdshell, using shell object.” Motobit Software,<br />

http://www.motobit.com/tips/detpg_cmdshell/ (accessed February 6, <strong>2009</strong>).<br />

4. Sarsfield, Brad, <strong>and</strong> Srik Raghavan. “Overview of Native XML Web Services for<br />

Microsoft <strong>SQL</strong> Server 2005.” Microsoft Corporation, http://msdn.microsoft.com/<br />

en-us/library/ms345123(<strong>SQL</strong>.90).aspx (accessed February 6, <strong>2009</strong>).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!