southern writes:"SQL Injection" is subset of the an unverified/unsanitized user input vulnerability ("buffer overflows" are a different subset), and the idea is to convince the application to run SQL code that was not intended. If the application is creating SQL strings naively on the fly and then running them, it's straightforward to create some real surprises.
We'll note that this was a somewhat winding road with more than one wrong turn, and others with more experience will certainly have different -- and better -- approaches. But the fact that we were successful does suggest that we were not entirely misguided.
There have been other papers on SQL injection, including some that are much more detailed, but this one shows the rationale of discovery as much as the process of exploitation.
more: UnixWiz
SQL Injection Attacks by Example
Posted on Saturday, December 05, 2015 @ 05:27:22 CST in Security
|
The Exploit Database
Posted on Friday, October 24, 2014 @ 13:10:55 CDT in Security southern writes:
|
htaccess codes
Posted on Saturday, September 07, 2013 @ 23:03:35 CDT in Security southern writes:
|
Preventing MySQL Injection
Posted on Friday, September 21, 2012 @ 20:34:59 CDT in Security Southern writes:
|
Microsoft Internet Explorer Multiple Vulnerabilities
Posted on Tuesday, August 14, 2012 @ 20:22:08 CDT in Security
|
Google Chrome Multiple Vulnerabilities
Posted on Thursday, August 02, 2012 @ 17:28:31 CDT in Security
|