29.01.2015 Views

to get the file

to get the file

to get the file

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Injection – SQL injection illustrated<br />

Application Layer<br />

Database Layer<br />

OS/Platform layer<br />

Network Layer<br />

HTTP<br />

request<br />

APPLICATION<br />

ATTACK<br />

<br />

Firewall<br />

Accounts<br />

Finance<br />

Administration<br />

Transactions<br />

Communication<br />

Knowledge Mgmt<br />

Cus<strong>to</strong>m Code<br />

App Server<br />

Web Server<br />

Hardened OS<br />

E-Commerce<br />

HTTP<br />

SQL<br />

response<br />

query<br />

<br />

<br />

<br />

Bus. Functions<br />

Firewall<br />

Databases<br />

Legacy Systems<br />

Web Services<br />

Direc<strong>to</strong>ries<br />

Human Resources<br />

DB Table<br />

<br />

<br />

Billing<br />

"SELECT * FROM<br />

Account Summary<br />

Account: accounts WHERE<br />

acct=‘’ SKU: OR 1=1--<br />

’"<br />

Acct:5424-6066-2134-4334<br />

Acct:4128-7574-3921-0192<br />

Acct:5424-9383-2039-4029<br />

Acct:4128-0004-1234-0293<br />

1. Application presents a form <strong>to</strong><br />

<strong>the</strong> attacker<br />

2. Attacker sends an attack in <strong>the</strong><br />

form data<br />

3. Application forwards attack <strong>to</strong><br />

<strong>the</strong> database in a SQL query<br />

4. Database runs query containing<br />

attack and sends encrypted results<br />

back <strong>to</strong> application<br />

5. Application decrypts data as<br />

normal and sends results <strong>to</strong> <strong>the</strong> user<br />

image source: www.owasp.org<br />

20

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!