Professional Documents
Culture Documents
Vulnerabilities
Knowledge NET
SQL Injection
• Databases supporting web servers and
applications are attractive targets for hackers
• Yields
Statement:= “SELECT Employeename FROM Emptable WHERE
Employeenum =1;DROP TABLE Emptable;
select * from login where uid='u1';drop table login
Union Select Statements
• SQL Injection in url to know the table name
http://page/index.asp?id=20 UNION SELECT TOP 1
TABLE_NAME FROM INFORMATION_SCHEMA.TABLES- -
• SQLDict.
This application was developed on Visual
FoxPro 8.0 and supports the access of a variety
of relational databases.
It provides a common interface to execute SQL
commands, implement and test for dictionary
attacks, browse and list database tables, display
table attributes,and export table attributes.
Automated SQL Injection
Tools
• Acunetix Web Vulnerability Scanner (WVS).
An automated scanner that can work in
conjunction with manual utilities to analyze Web
applications for vulnerabilities, it can be used for
penetration testing
• Osql.
Although this utility has been replaced by
sqlcmd, it is good to be aware of it. Osql
interacts with a web server using ODBC and
supports entering script files, Transact-SQL
statements, and system procedures to the server
database SQLDict.
ASSESSMENT
QUESTIONS