28.10.2014 Views

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

472 Index<br />

testing <strong>and</strong> inference (Continued)<br />

blind injection detection, 56–60<br />

confirming <strong>and</strong> terminating<br />

back-end server, 73<br />

BENCHMARK function, 79<br />

database comment syntax, 69–70<br />

database concatenation operators, 72–73<br />

DBMS_LOCK.SLEEP( ) function, 80<br />

executing multiple statement, 74–78<br />

exploitation, 71<br />

inline function, 62–68<br />

multiline comments, 71–72<br />

numbers <strong>and</strong> strings, 61<br />

statement, 68–69<br />

testing string, 73–74<br />

time delays, 79–80<br />

trial-<strong>and</strong>-error process, 60–61<br />

Victim Inc, 70<br />

database errors<br />

information flow, 40<br />

Microsoft <strong>SQL</strong> Server, 41–46<br />

My<strong>SQL</strong>, 46–49<br />

Oracle, 49–50<br />

triggers, 41<br />

GET requests, 31–32<br />

information workflow, 39–40<br />

injectable data, 35–36<br />

manipulating parameters, 36–39<br />

POST requests, 32–35<br />

Trigger anomalies, 31<br />

three-tier architecture, 4–5<br />

time-based techniques<br />

database queries<br />

methods, 235<br />

My<strong>SQL</strong> delays, 235–238<br />

Oracle delays, 240–241<br />

<strong>SQL</strong> Server delays, 238–240<br />

inference considerations, 241<br />

transmission control protocol (TCP),<br />

250, 281<br />

troubleshooting <strong>SQL</strong> injection attacks,<br />

443–446<br />

U<br />

UNION statements<br />

data types<br />

back-end database, 155<br />

brute-force guessing, 151<br />

cast operators, 153<br />

integer <strong>and</strong> string, 152<br />

looping statement, 156<br />

multiple data, 153<br />

NULL clause, 151<br />

SELECT queries, 154<br />

system_user <strong>and</strong> db_name( ), 152–153<br />

WHERE clause, 155<br />

matching columns<br />

DBMS technology, 149<br />

ORDER BY clause, 150–151<br />

products.asp, 150<br />

requirements, 149<br />

syntax, 148–149<br />

universal naming convention (UNC), 280<br />

user datagram protocol (UDP), 251, 297<br />

user-defined function (UDF), 294<br />

V<br />

virtual private database (VPD), 370<br />

W<br />

Web application firewalls (WAF), 318<br />

HTTP/HTTPS, 379<br />

ModSecurity<br />

configurable rule set, 380–383<br />

generic attacks rule file, 382<br />

intrusion detection capabilities, 385–356<br />

request normalization, 383–384<br />

REQUEST variables <strong>and</strong> coverage, 383<br />

SecRule, generic syntax, 380–382<br />

<strong>SQL</strong> errors leakage rule, 385

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!