28.10.2014 Views

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

464 Index<br />

finding <strong>and</strong> confirmation (Continued)<br />

id parmeter, 222<br />

string parameter, 224<br />

forcing generic errors, 221<br />

four-tier architecture, 5–6<br />

G<br />

GET <strong>and</strong> POST parameters, 7<br />

H<br />

HTTP exfiltration<br />

HTTPURITYPE package, 256<br />

Oracle function, 256–257<br />

ORDER BY clause, 258<br />

hybrid attacks<br />

cross-site scripting (XSS), 335–336<br />

exploiting authenticated<br />

vulnerabilities, 337<br />

leveraging captured data, 335<br />

operating system comm<strong>and</strong>s,<br />

Oracle, 336<br />

I<br />

inference techniques<br />

ASCII( ) function, 231<br />

bitstring, 234<br />

bitwise operations, 232<br />

extracting data method, 230<br />

one bit information, 226<br />

<strong>SQL</strong> Server database, 227<br />

status parameter, 228<br />

SUBSTRING( ) function,<br />

228–229<br />

transact-<strong>SQL</strong>, 233<br />

Informix cheat sheet<br />

blind <strong>SQL</strong> injection functions, 452<br />

database configuration information<br />

<strong>and</strong> schema, 451<br />

Ingres cheat sheet<br />

blind <strong>SQL</strong> injection functions, 453<br />

database configuration information<br />

<strong>and</strong> schema, 452–453<br />

inline function<br />

numeric values<br />

exploitation, 67<br />

principles, 67–68<br />

single-quote delimiters, 67<br />

uid parameter, 66<br />

unique identification, 65–66<br />

visual representation, 66<br />

strings<br />

finding process, 63<br />

OR condition, 64<br />

<strong>SQL</strong> statement, 62–63<br />

testing function, 65<br />

Unclosed quotation<br />

markerror, 64<br />

input filters<br />

bypassing custom filters, 326–327<br />

case variation, 319<br />

comments, 319–320<br />

dynamic query execution, 322–323<br />

non-st<strong>and</strong>ard entry points, 327–328<br />

null bytes, 323–324<br />

search Query referers, 329<br />

<strong>SQL</strong> injection attacks, 318<br />

stripped expressions, 324<br />

truncation, 324–326<br />

Unicode encodings, 321–322<br />

URL encoding, 320–321<br />

input validation<br />

.NET, 354<br />

blacklisting, 351–352<br />

Java<br />

defaultvalidator, 354<br />

Java server faces ( JSF), 353<br />

PHP, 354–355<br />

whitelisting<br />

binary blob, 350<br />

luhn formula, 349

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!