28.10.2014 Views

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

408 Chapter 9 • Platform-Level <strong>Defense</strong>s<br />

Figure 9.12 HTML noindex Meta Tag<br />

to Help Prevent Search Engine Indexing<br />

<br />

Here are a few links from the popular search engines to help protect your Web pages<br />

from unwanted discovery:<br />

■■<br />

■■<br />

www.google.com/support/webmasters/bin/answer.py?hl=en&answer=35301<br />

help.yahoo.com/l/us/yahoo/search/webcrawler/slurp-04.html<br />

Disable Web Services<br />

Description Language (WSDL) Information<br />

Web services are often just as vulnerable to <strong>SQL</strong> injection as Web applications. To find<br />

vulnerabilities in Web services, attackers need to know how to communicate with the Web<br />

service, namely the supported communication protocols (e.g., SOAP, HTTP GET, etc.),<br />

method names, <strong>and</strong> expected parameters. All of this information can be extracted from the<br />

Web Services Description Language (WSDL) file of the Web service. Usually this is invoked<br />

by appending a ?WSDL to the end of the Web service URL. Whenever possible, it is a good<br />

idea to suppress this information from unwanted intruders.<br />

Figure 9.13 shows how to configure a .NET Web service so that it does not display the<br />

WSDL. You can apply this configuration change to the application web.config or machine.<br />

config file.<br />

Figure 9.13 Configuration to Disable<br />

the Display of .NET Web Service WSDL Information<br />

<br />

<br />

<br />

<br />

<br />

Apache Axis, a commonly used Simple Object Access Protocol (SOAP) Web service<br />

platform for Java applications, supports custom configuration of the WSDL file, which can<br />

be used to suppress auto-generation. You can configure the wsdlFile setting in the service’s .<br />

wsdd file to point to a file that returns an empty tag.<br />

In general, leaving WSDL information remotely accessible on Internet-facing Web servers<br />

is strongly discouraged. You can use an alternative secured communication channel, such as

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!