Update for 08-03-22 14:15
This commit is contained in:
parent
1c573a3b52
commit
beb9b51184
@ -66,6 +66,29 @@ This would disable the password check, and return all rows to the application.
|
|||||||
Attacker can send another query after the intended query, allowing them to
|
Attacker can send another query after the intended query, allowing them to
|
||||||
extract more information.
|
extract more information.
|
||||||
|
|
||||||
|
== Inferential attack ==
|
||||||
|
|
||||||
|
Inferential attacks occour when there is no actual transfer of data, but the
|
||||||
|
attack is able to reconstruct the information by sending particular requests
|
||||||
|
and observing the resulting behavior of the websites/database.
|
||||||
|
|
||||||
|
=== Illegal or incorrect queries ===
|
||||||
|
|
||||||
|
A reconsiance step for attackers. By intenionally creating errors, attacker is
|
||||||
|
able to gather info from very verbose error pages
|
||||||
|
|
||||||
|
=== Blind SQL injection ===
|
||||||
|
|
||||||
|
Attacker infer the data present in a database system even when the system is
|
||||||
|
secure enough to not show verbose error messages. The attacker asks server T/F
|
||||||
|
questions. If the query is true, the site functions like normal.
|
||||||
|
|
||||||
|
== Solutions ==
|
||||||
|
|
||||||
|
* Defensive coding
|
||||||
|
* Paramterized query insertion
|
||||||
|
* Use Typesafe SQL DOM
|
||||||
|
|
||||||
== Also see ==
|
== Also see ==
|
||||||
|
|
||||||
* [[sql]]
|
* [[sql]]
|
||||||
|
Loading…
Reference in New Issue
Block a user