Language:EN
Pages: 5
Rating : ⭐⭐⭐⭐⭐
Price: $10.99
Page 1 Preview
mysql cheat sheet blind sql injection functions

Mysql cheat sheet blind sql injection functions

intercepting filters reading files Index

465

application filters

.NET binary, 286

386–387 CREATE ASSEMBLY function, 287

UrlScan and WebKnight, 387–388 Internet information server (IIS), 310

J RDBMS, 281

Java applications
coding behavior recognition, 103–104 dangerous funtions, 107–108

K union query, 282
keyword-blocking filter, 319–320 writing files
binary files, 295–297
M bulk copy program (BCP), 296 Microsoft access databases, 453
csc.exe, 300 Microsoft code analysis tool .NET (CAT. DOS copy command, 297 NET), 129 dynamic link library (DLL), 298 Microsoft SQL Server echo commands, 297
database
file compiling, 300 O’Boyle string, 359 filesystemobject, 295
preceding characters, 360 meterpreter, 298
transact-SQL code, 359 remote database server, 298–300 wildcard character, 360
sp_oacreate, 295 encoding output, database, 359–360 UNIX, 298
operating system commands worms, 297

.NET binary, 307–308
ipconfig command, 305
surface area configuration, 306

466

Microsoft SQL server cheat sheet

(Continued)

server 2005 hashes, 431 vulnerable intranet application, 276

xp_cmdshell, 429–430 writing files

MySQL hackproofing, 295

administrative privileges, 177 LOAD DATA INFILE command, 292

out-of-band communication, 198–199 output tables, 178–179
password hashes, 192
PASSWORD( ) function, 194

open Web application security project (OWASP), 10–11, 371
Operating system exploition
database programmers, 272

hackproofing, 278 Oracle, 301–304

HEX( ) function, 279
LOAD DATA INFILE command, 274 LOAD_FILE function, 275, 279–280

APEX, 196–197

Index

467

Oracle cheat sheet

concept, 190

blind SQL injection functions, 436–437
database configuration information and

database server attacking

dbms_assert, 357
O’Boyle, 356
preceding functions, 358
quote character, 357
database schema enumeration,

encoding output, database, 356–359 escalating privileges, 183–184

built-in database, 117
data definition language (DDL)

EXECUTE function, 119–120
information_schema database, 123
LIKE statement, 118
sp_helptext, 120–121
SQL Server 2008 database, 122–123 stored procedures, 121–122
user-controlled data, 119
Oracle response techniques, 246–247

out-of-band communication, 198–199
password hashes, 192 P
PL/SQL code, 190 parameterized statement privilege types, 181–182 .NET (C#)
reading files
ADO.NET framework, 345 access files, 289 OleDbClient, 346
Java, 289–291 Java
select statements, 290 hibernate, 345
utl_ file_dir database, 289, 291
JDBC framework, 344 writing files PHP
binary code, 300 data objects, 347
DBMS_ADVISOR, 301 PDO package, 348

$input variable, 113–114 $sql variable, 112–113
awk function, 110
grep strings, 112

database server attacking
cracking database passwords, 449 local file access, 449
system command execution, 448

Aspect-oriented Programming (AOP), MySQL

393–394 FALSE inference, 243

CASE statement, 246 reviewing source code

techniques $param, 97–98

URL/page-level strategies
HTTP Handler configuration, 392 page overriding, 392–393
substitute servlet configuration, 393 web application firewall (WAF),

command-line utilities, 124
control fl ow graph (CFG), 125 LAPSE, 127–128
lexical analysis, 124–125
Microsoft analyzer, 128–129

PL/SQL and T-SQL code

Index

469

authid clause, 117

static analysis, 131–132
yet another source code analyzer
(YASCA), 125–126
coding behavior recognition
build and execute statements, 99
C# applications, 104–105
dynamic string-building techniques, 98 EXECUTE function, 100–101

EXECUTE function, 119–120
information_schema database, 123
LIKE statement, 118
sp_helptext, 120–121
SQL Server 2008 database, 122–123 stored procedures, 121–122
user-controlled data, 119
security-sensitive function, 96–97

string concatenation, 99 user-controlled input, 101 dangerous funtions

sanitizing filters, 324
SDL. See Microsoft security
development lifecycle

HTTP request and response, 329–330 second-order vulnerabilities, 332–333

data process Secure sockets layer (SSL), 407

Java, 114–115 simple object access protocol (SOAP),

PHP, 110–114 310–311

built-in command, 16

You are viewing 1/3rd of the document.Purchase the document to get full access instantly

Immediately available after payment
Both online and downloadable
No strings attached
How It Works
Login account
Login Your Account
Place in cart
Add to Cart
send in the money
Make payment
Document download
Download File
img

Uploaded by : Amanda Roberts

PageId: DOC9C4B5E0