28.10.2014 Views

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

462 Index<br />

deployment considerations (Continued)<br />

configuration techniques, 404–405<br />

DNS lookups, dummy host names,<br />

406–407<br />

empty default web site, 406<br />

HTML noindex Meta Tag, 408<br />

search engine hacking, limit discovery,<br />

407–408<br />

suppress error messages, 403–404<br />

Web Services Description Language<br />

(WSDL) information, 408–409<br />

wildcard SSL certificates, 407<br />

web <strong>and</strong> database servers, separate<br />

hosts, 409<br />

web server logs, verbosity, 409<br />

design techniques<br />

abstraction layers, 367<br />

avoiding obvious object names,<br />

369–370<br />

database honeypots, 370–371<br />

h<strong>and</strong>ling sensitive data<br />

database, 368<br />

incident response, 369<br />

secure development resources<br />

notable projects, 371<br />

red-database-security, 372<br />

stored procedures<br />

access control, 366<br />

web application, 367<br />

DNS. See domain name system (DNS)<br />

domain name system (DNS), 220, 406<br />

dynamic link library (DLL), 298<br />

dynamic query, 342<br />

dynamic string building techniques<br />

built-in comm<strong>and</strong>, 16<br />

error h<strong>and</strong>ling, 18–19<br />

escape characters h<strong>and</strong>ling, 14–15<br />

h<strong>and</strong>ling types, 15–16<br />

multiple submissions h<strong>and</strong>ling, 19–21<br />

parameterized queries, 13–14<br />

PHP code, 14<br />

query assembly h<strong>and</strong>ling, 17–18<br />

string-building techniques, 14<br />

E<br />

e-commerce application, 3<br />

E-mail<br />

exfiltration, 255–256<br />

Microsoft <strong>SQL</strong> Server<br />

database Mail account, 201–202<br />

e-mailing subsystems, 199<br />

procedure, 201<br />

sp_send_dbmail, 200<br />

Oracle, 202<br />

enterprise security application program<br />

interface (ESAPI), 354<br />

exploit techniques<br />

arbitrary data, 163–164<br />

automated exploitation<br />

Bobcat, 211–212<br />

B<strong>SQL</strong>, 212–214<br />

other tools, 214<br />

Sqlmap, 208–211<br />

black-box attack approach, 139<br />

conditional statements<br />

content-based approach, 161<br />

DBMS technologies, 157<br />

error-based approach, 159–160<br />

methods, 156<br />

time-based approach, 157–159<br />

database schema enumeration<br />

hash functions, 176<br />

My<strong>SQL</strong>, 177–180<br />

Oracle, 180–183<br />

<strong>SQL</strong> Server, 170–176<br />

database server<br />

blind fingerprint, 146–148<br />

internet information server (IIS), 142<br />

non-blind fingerprint, 142–146<br />

e-commerce application, 140

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!