Vulnerability disclosure model like full disclosure expect ….
expect all stakeholders agree to allow a period of time for the vulnerability to be patched
SQL Injection – What is it?
Inputs to the application that interact with a
backend database directly can be vulnerable to
SQL injection
SQLi – What can you do?
The attack targets the system and can lead to the
following;
Detection Techniques
Fingerprinting the DB (two methods)
First method is to observe the error returned by the DB where each DB will throw a different error message
Second method can be used in the case of:
- No error message
- Custom error message
3 SQL Injection Classes
When trying to exploit an SQL Injection there are two
outcomes for the attacker:
3 SQLi Techniques
Union technique can be used to find out …
2. Find out column type
Other SQLi Techniques
SQL Injection Mitigation
There are several options and each one should be
considered for each vulnerability. Applications differ
greatly and one technique may not be suitable for all
Parameterised Queries
only allows for the correct data type to be inputted
Other SQLi defences