Summary:
The following is to help those who want to master this vulnerability and want to know how to protect themselves from this vulnerability attack.
Written in the nature of the hole.
Details:
1.0 introduction
When a machine is only open for 80 ports (here, it means to provide HTTP service), most of you may not give you a lot of your vulnerabilities.
Valuable information (vulnerability information), if the administrator of this machine is often playing patch for his server, we have to attack the attack.
The spear headeds the web service attack. SQL injection attack is one of the web attack type, this attack has no special requirements, only need
The other party provides normal HTTP services and does not need to pay attention to whether the administrator is a "patch mad". Such an attack is mainly for some kind of web processing
Programs (such as ASP, JSP, PHP, CGI, etc.).
This article is not to introduce any new "玩", and SQL injection attack has been widely circulated. I will write this now.
An article is because I want to record some of my experiences from my recent experiment, I hope to give readers some references. you can also
In "9.0 I can get more related information?" Found more other people, about SQL injection techniques
material.
1.1 What is SQL injection?
This attack is to put SQL's query / behavior commands through 'embedd' in a legal HTTP submission request to attack.
Some intentions of people. Nowadays, many dynamic web pages will get some parameters from the request of the web user, and then dynamically constitute SQL.
Seeking to send the database. For example, when a user needs to log in (user authentication) on the web page, the dynamic web page will
The username submitted by the user is added to the SQL inquiry request to send it to the database to confirm whether the authentication information submitted by the user is.
effective. In the perspective of SQL injection attack, this can make us then modify the user name and / or password value when sending SQL requests
The domain 'area to achieve the purpose of attack.
1.2sql injection requires what (tools, etc.)?
One (some) web browser.
2.0 What information is what you need to find?
First you need to find a page that allows submission of data, such as: Landing page, search page, feedback page, and more. Sometimes, some HTML
The page will pass the required parameters to other ASP pages via the post command. So, sometimes you will not see the relevant in the URL path.
Parameters. Despite this, you can still distinguish whether there is a parameter delivery, related code by viewing the "form" tab in the source code of HTML.
as follows: