SQL injection Figure 1 By Kaveri Bhasin Motive
SQL injection Figure 1 By Kaveri Bhasin
Motive of SQL Injection • Obtain data from database • Modify system functions • Insert data in the backend database
Figure 2.
Victims Mostly Web applications with user input facilities.
Simplest Procedure 1. Guess field names. 2. Construct a query and check for SQL status 3. If server gives error, field name is incorrect, else lets proceed…
Cont. • With the correct field, construct SQL query and inject Example: 101 AND Len(( SELECT first_name FROM user_data WHERE userid =15613)) = 6
Paper overview • Types of Vulnerabilities • Measures • Tools (Webgoat)
Types of vulnerabilities • Database system vulnerability • Type handling • Injected filtered escape characters
Measures • Web application design: Analyze against vulnerabilities • Use strongly defined types and validation for user input • Use parameterized queries
Tools • Webgoat Developed by OWASP. org Free source to experiment and learnt about SQL injection
Conclusion SQL injection is a serious concern A single design error can be disastrous for the security of sensitive information
References • Figure 1. http: //ocliteracy. com/techtips/sql-injection. html • Figure 2. “Towards an Aspect-Oriented Intrusion Detection Framework” • Zhi Jian Zhu and Mohammad Zulkernine • http: //www. owasp. org/ • http: //www. spidynamics. com/papers/SQLInjection. White. Paper. pdf
- Slides: 13