28.10.2014 Views

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

468 Index<br />

parameterized statement (Continued)<br />

PL/<strong>SQL</strong>, 348–349<br />

pattern-matching filters, 319<br />

payment card industry data security<br />

st<strong>and</strong>ards (PCI-DSS), 368<br />

PHP applications<br />

$input variable, 113–114<br />

$sql variable, 112–113<br />

awk function, 110<br />

grep strings, 112<br />

mssql_execute( ) <strong>and</strong> odbc_prepare( ), 111<br />

user-controlled data, 113<br />

platform-level defenses<br />

Application Intrusion Detection Systems<br />

(IDSs), 394<br />

Aspect-oriented Programming (AOP),<br />

393–394<br />

database firewall, 394–395<br />

intercepting filters<br />

filter pattern, scripted languages,<br />

390–391<br />

filtering web service messages, 391<br />

web server <strong>and</strong> application filters,<br />

386–391<br />

non-editable versus editable input<br />

protection, 391–392<br />

resource proxying/wrapping, 393<br />

runtime protection technologies <strong>and</strong><br />

techniques<br />

code changes, 379<br />

Commercial off-the-shelf (COTS)<br />

applications, 378<br />

URL rewriting, 393<br />

URL/page-level strategies<br />

HTTP H<strong>and</strong>ler configuration, 392<br />

page overriding, 392–393<br />

substitute servlet configuration, 393<br />

web application firewall (WAF),<br />

379–380<br />

generic attacks rule file, 382<br />

ModSecurity, 380–386<br />

SecRule, generic syntax, 380–382<br />

Postgre<strong>SQL</strong> cheat sheet<br />

blind <strong>SQL</strong> injection functions, 448<br />

database confi guration information <strong>and</strong><br />

schema, 446–447<br />

database server attacking<br />

cracking database passwords, 449<br />

local file access, 449<br />

system comm<strong>and</strong> execution, 448<br />

R<br />

Relational database management system<br />

(RDBMS), 281<br />

response-based techniques<br />

My<strong>SQL</strong><br />

FALSE inference, 243<br />

Web application, 242<br />

one bit information<br />

binary search method, 249<br />

CASE statement, 248<br />

Oracle<br />

CAST( ), 247<br />

key bits, 246<br />

<strong>SQL</strong> Server<br />

ASP.NET, 245<br />

CASE statement, 246<br />

reviewing source code<br />

$param, 97–98<br />

automated tools<br />

abstract syntax tree (AST), 125<br />

AppCodeScan, 127<br />

CodeSecure, 132<br />

comm<strong>and</strong>-line utilities, 124<br />

control fl ow graph (CFG), 125<br />

LAPSE, 127–128<br />

lexical analysis, 124–125<br />

Microsoft analyzer, 128–129<br />

Microsoft code analysis tool .NET<br />

(CAT.NET), 129

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!