28.10.2014 Views

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

A<br />

abstract syntax tree (AST), 125<br />

application program interfaces (APIs), 342<br />

Aspect-oriented programming (AOP),<br />

393–394<br />

Asprox Botnet, 77–78<br />

AST. See abstract syntax tree<br />

automated source code review<br />

abstract syntax tree (AST), 125<br />

AppCodeScan, 127<br />

CodeSecure, 132<br />

comm<strong>and</strong>-line utilities, 124<br />

control flow graph (CFG), 125<br />

LAPSE, 127–128<br />

lexical analysis, 124–125<br />

Microsoft analyzer, 128–129<br />

Microsoft code analysis tool .NET (CAT.<br />

NET), 129<br />

mysql_query( ) function, 124<br />

Ounce, 131<br />

Pixy, 126–127<br />

SCAs, 130–131<br />

security compass Web application analysis<br />

tool (SWAAT), 128<br />

source code analyzers (SCAs), 129–130<br />

static analysis, 131–132<br />

yet another source code analyzer<br />

(YASCA), 125–126<br />

automated <strong>SQL</strong> injection discovery<br />

database error, 80<br />

GET <strong>and</strong> POST requests, 80<br />

HP Scrawlr, 85–87<br />

HP WebInspect<br />

authentication mechanisms, 82<br />

Hewlett-Packard, 81<br />

testing string, 83<br />

IBM Rational AppScan, 83–85<br />

Paros Proxy, 88–90<br />

<strong>SQL</strong>iX, 87–88<br />

tasks, 80<br />

automated techniques<br />

absinthe<br />

configuration tab, 260<br />

GPL tool, 258<br />

injectable parameter, 259<br />

B<strong>SQL</strong> hacker<br />

extracting database login, 263<br />

features, 260<br />

request <strong>and</strong> injection tab, 262<br />

URL textbox, 261<br />

<strong>SQL</strong>Brute<br />

FALSE statement, 263–264<br />

python interpreter, 263<br />

sqlninja<br />

extraction of username, 265<br />

<strong>SQL</strong> server installations, 264<br />

squeeza<br />

DNS channel, 265<br />

GET <strong>and</strong> POST parameters, 266<br />

B<br />

BCP. See bulk copy program<br />

blind <strong>SQL</strong> injection techniques<br />

channels, 234<br />

inference techniques<br />

ASCII( ) function, 231<br />

bitstring, 234<br />

bitwise operations, 232<br />

extracting data method, 230<br />

one bit information, 226<br />

<strong>SQL</strong> Server database, 227<br />

status parameter, 228<br />

Index<br />

459

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!