Southern writes:"SQL Injection" is subset of the an unverified/unsanitized user input vulnerability ("buffer overflows" are a different subset), and the idea is to convince the application to run SQL code that was not intended. If the application is creating SQL strings naively on the fly and then running them, it's straightforward to create some real surprises.
We'll note that this was a somewhat winding road with more than one wrong turn, and others with more experience will certainly have different -- and better -- approaches. But the fact that we were successful does suggest that we were not entirely misguided.
There have been other papers on SQL injection, including some that are much more detailed, but this one shows the rationale of discovery as much as the process of exploitation.
more: UnixWiz
SQL Injection Attacks by Example
Posted on Friday, January 13, 2012 @ 15:26:03 CST in Security
|
Connection Strings Explained
Posted on Friday, January 13, 2012 @ 15:24:43 CST in Internet Southern writes:
|
Opera Multiple Vulnerabilities
Posted on Wednesday, December 07, 2011 @ 16:10:48 CST in Security
|
Download.Com Caught Adding Malware to Nmap & Other Software
Posted on Wednesday, December 07, 2011 @ 16:01:21 CST in Security Southern writes:
|
Spammers and Medications
Posted on Wednesday, December 07, 2011 @ 15:58:01 CST in Miscellaneous-Off Topic papamike writes:
|
SQL Injection Attack happening ATM, 4000+ sites infected
Posted on Sunday, December 04, 2011 @ 09:24:11 CST in Security Crypto writes:
|