28.10.2014 Views

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

450 Chapter 10 • References<br />

Table 10.24 Extracting DB2 Database Configuration Information<br />

Data<br />

Version<br />

Current user<br />

List users<br />

Current user privileges<br />

Query<br />

SELECT versionnumber, version_timestamp FROM<br />

sysibm.sysversions;<br />

SELECT user FROM sysibm.sysdummy1;<br />

SELECT session_user FROM sysibm.sysdummy1;<br />

SELECT system_user FROM sysibm.sysdummy1;<br />

SELECT grantee FROM syscat.dbauth;<br />

SELECT * FROM syscat.dbauth WHERE grantee =user;<br />

SELECT * FROM syscat.tabauth WHERE grantee =user;<br />

SELECT * FROM syscat.tabauth;<br />

Table 10.25 Extracting DB2 Database Schema<br />

Data<br />

Current database<br />

List databases<br />

List tables<br />

List columns<br />

Query<br />

SELECT current server FROM sysibm.sysdummy1;<br />

SELECT schemaname FROM syscat.schemata;<br />

SELECT name FROM sysibm.systables;<br />

SELECT name, tbname, coltype FROM sysibm.syscolumns;<br />

Blind <strong>SQL</strong> <strong>Injection</strong> Functions: DB2<br />

Table 10.26 lists functions that are useful when performing blind <strong>SQL</strong> injection attacks.<br />

Table 10.26 Blind <strong>SQL</strong> <strong>Injection</strong> Functions<br />

Data<br />

String length<br />

Extract substring from a<br />

given string<br />

String (‘ABC’) representation<br />

with no single quotes<br />

Query<br />

LENGTH()<br />

SUBSTRING(string,offset,length) FROM<br />

sysibm.sysdummy1;<br />

SELECT CHR(65)||CHR(66)||CHR(67);

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!