SQL Power Injector Avadanei AlinBalan Robert. What is SQL Power Injector ?  A graphical application created in C#.Net 1.1 that helps the penetration.

Slides:



Advertisements
Similar presentations
PHP I.
Advertisements

HI-TEC 2011 SQL Injection. Client’s Browser HTTP or HTTPS Web Server Apache or IIS HTML Forms CGI Scripts Database SQL Server or Oracle or MySQL ODBC.
Aqua Data Studio. Find the application We are using Aqua Data Studio v11.
Exadata Distinctives Brown Bag New features for tuning Oracle database applications.
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011.
Common Exploits Aaron Cure Cypress Data Defense. SQL Injection.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
WebGoat & WebScarab “What is computer security for $1000 Alex?”
For Removal Info: visit
NAVY Research Group Department of Computer Science Faculty of Electrical Engineering and Computer Science VŠB-TUO 17. listopadu Ostrava-Poruba.
Database Connectivity Rose-Hulman Institute of Technology Curt Clifton.
GreenSQL Yuli Stremovsky /MSN/Gtalk:
Web Application Security Assessment and Vulnerability Assessment.
Nikto LUCA ALEXANDRA ADELA. Nikto  Web server assessment tool  Written by Chris Solo and David Lodge  Released on December 27, 2001  Stable release:
W3af LUCA ALEXANDRA ADELA – MISS 1. w3af  Web Application Attack and Audit Framework  Secures web applications by finding and exploiting web application.
1 IS 2150 / TEL 2810 Introduction to Security James Joshi Associate Professor, SIS Lecture 12.1 Nov 20, 2012 SQL Injection Cross-Site Scripting.
SJSU CS157B Dr. Lee1  2004 Jenny Mitchell Two Useful Tools You Can’t Live Without by Jenny Mitchell SJSU CS157B Section PHP and MySQL.
Web Sites for amateur radio. So You want to make a Web Site? There are several things you need to know about web sites before you start to think about.
MIS Week 11 Site:
Penetration Testing Training Day Capture the Flag Training.
Analysis of SQL injection prevention using a proxy server By: David Rowe Supervisor: Barry Irwin.
Chapter 7 PHP Interacts with Ms. Access (Open DataBase Connectivity (ODBC))
JavaScript, Fourth Edition
Lecture 16 Page 1 CS 236 Online SQL Injection Attacks Many web servers have backing databases –Much of their information stored in a database Web pages.
LiveCycle Data Services Introduction Part 2. Part 2? This is the second in our series on LiveCycle Data Services. If you missed our first presentation,
Contents 1.Introduction, architecture 2.Live demonstration 3.Extensibility.
Security Scanners Mark Shtern. Popular attack targets Web – Web platform – Web application Windows OS Mac OS Linux OS Smartphone.
Final Demo MedConnection Giant Squid Michael Cohen Robert Esho Chris Hogan Kate Kuleva Nisha Makwana Alex Rodrigues Rafal Urbanczyk.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
(VPD) Virtual Private Database Technique Hessah Hassan Al_kaoud.
Effective Security in ASP.Net Applications Jatin Sharma: Summer 2005.
Attacking Data Stores Brad Stancel CSCE 813 Presentation 11/12/2012.
ASP.NET The Clock Project. The ASP.NET Clock Project The ASP.NET Clock Project is the topic of Chapter 23. By completing the clock project, you will learn.
Analysis of SQL injection prevention using a filtering proxy server By: David Rowe Supervisor: Barry Irwin.
© 2008 Security-Assessment.com 1 Time based SQL Injection Presented by Muhaimin Dzulfakar.
1 Chapter 2: Working with Data in a Project 2.1 Introduction to Tabular Data 2.2 Accessing Local Data 2.3 Accessing Remote Data 2.4 Importing Text Files.
SQL Injection Jason Dunn. SQL Overview Structured Query Language For use with Databases Purpose is to retrieve information Main Statements Select Insert.
Security Attacks CS 795. Buffer Overflow Problem Buffer overflows can be triggered by inputs that are designed to execute code, or alter the way the program.
2 Using Administration Tools Objectives Using the Server Manager Line Mode Identifying administration applications supplied with the Oracle Enterprise.
SQL – Injections Intro. Prajen Bhadel College of Information Technology & Engeneering Kathmandu tinkune Sixth semister.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Web Security Group 5 Adam Swett Brian Marco. Why Web Security? Web sites and web applications constantly growing Complex business applications are now.
BlackBerry Applications using Microsoft Visual Studio and Database Handling.
Web Security Lesson Summary ●Overview of Web and security vulnerabilities ●Cross Site Scripting ●Cross Site Request Forgery ●SQL Injection.
Security Attacks CS 795. Buffer Overflow Problem Buffer overflow Analysis of Buffer Overflow Attacks.
Chapter 5 Introduction To Form Builder. Lesson A Objectives  Display Forms Builder forms in a Web browser  Use a data block form to view, insert, update,
Learningcomputer.com SQL Server 2008 – Management Studio.
8 th Semester, Batch 2009 Department Of Computer Science SSUET.
2 Copyright © 2006, Oracle. All rights reserved. Configuring Recovery Manager.
SQL Query Analyzer. Graphical tool that allows you to:  Create queries and other SQL scripts and execute them against SQL Server databases. (Query window)
LOAD RUNNER. Product Training Load Runner 3 Examples of LoadRunner Performance Monitors Internet/Intranet Database server App servers Web servers Clients.
SQL Injection By Wenonah Abadilla. Topics What is SQL What is SQL Injection Damn Vulnerable Web App SQLI Demo Prepared Statements.
Chapter 7 SQL Injection I: Identification
Browsing Tips Mozilla Firefox. About Firefox Available at Available at Maintained.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
SQL Injection By Wenonah Abadilla.
Presentation by: Naga Sri Charan Pendyala
Security: Exploits & Countermeasures
Security: Exploits & Countermeasures
Chapter 19 PHP Part III Credits: Parts of the slides are based on slides created by textbook authors, P.J. Deitel and H. M. Deitel by Prentice Hall ©
PHP / MySQL Introduction
Lecture 2 - SQL Injection
Web Hacking: Beginners
Security: Exploits & Countermeasures
Security: Exploits & Countermeasures
Security: Exploits & Countermeasures
SQL Server 2005 Reporting Services
UFCEUS-20-2 Web Programming
Web Application Development Using PHP
Presentation transcript:

SQL Power Injector Avadanei AlinBalan Robert

What is SQL Power Injector ?  A graphical application created in C#.Net 1.1 that helps the penetration tester to inject SQL commands on a web page.  Its main strength is its capacity to automate tedious blind SQL injection with several threads.  For now it is SQL Server, Oracle and MySQL compliant, but it is possible to use it with any existing DBMS when using the inline injection (Normal mode).  The normal mode is basically the SQL command that someone will put in the parameter sent to the server.

How it works ?  The multithreaded automation of the injection gives the possibility to automate tedious and time consuming queries  The query can be modified to get only what you want.  Moreover this application will get all the parameters you need to test the SQL injection, either by GET or POST method, avoiding thus the need to use several applications or a proxy to intercept the data.  Firefox plugin that will launch SQL Power Injector ?? – No longer available

Multithreaded automation  The automation can be realized in two ways:  comparing the expected result  by time delay  The first way is generally compared against an error or difference between positive condition with a negative one.  The second way will turn out positive if the time delay sent to the server equals to the one parameterized in the application.

Features  Supported on Windows, Unix and Linux operating systems  SQL Server, Oracle, MySQL, Sybase/Adaptive Server and DB2 compliant  SSL support  Load automatically the parameters from a form or a IFrame on a web page (GET or POST)  Detect and browse the framesets  Option that auto detects the language of the web site  Detect and add cookies used during the Load Page process (Set-Cookie detection)

Features  Find automatically the submit page(s) with its method (GET or POST) displayed in a different color  Can create/modify/delete loaded string and cookies parameters directly in the Datagrids  Single SQL injection  Blind SQL injection  Comparison of true and false response of the page or results in the cookie  Time delay  Response of the SQL injection in a customized browser  Multithreading (configurable up to 50)

Demo

Differences with Other Tools  Web page string and cookie parameters auto detection  Fine tuning parameters SQL injection  Time delay feature  Multithread feature  Response results in a customized browser  Automated positive and negative condition discovery  Blind SQL injection characters preset optimizer

Conclusion  In closing, SQL injection enables you to inject malicious code into strings that are destined for storage in a table or as metadata and test your webpages and databases for security vulnerabilities