Page 1 of 6 123 ... LastLast
Results 1 to 10 of 54

Thread: sql injection basis tutorial

  1. #1
    Senior Member shamanvirtuel's Avatar
    Join Date
    Mar 2010
    Location
    Somewhere in the "Ex" human right country
    Posts
    2,988

    Default sql injection basis tutorial

    i was looking for a good tutorial on sql injection for a friend when i found that :
    http://packetstorm.linuxsecurity.com...sql-inject.pdf

    good and simple..........

    here is the foreword :
    The Uncommon SQL Injection white paper is, as promised by the title, virtually
    unlike any other SQL injection walk through on the web. This written lesson aims to not
    only provide a comprehensive reference, and to serve as a learning aid, but also to help
    those who have searched the internet high and low for an SQL injection paper that is of
    real use. I have found that a majority, if not all, of the SQL injection guides that I have
    read in the past (and I have read many in my day) are teeming with typographical errors,
    poor displays of grammatical skills, astonishingly complex words that the author himself
    barely understands, or do not cover certain techniques that are necessary to use when
    performing an injection on a real website. Grasping this subject can be tricky enough
    without having to decipher what you are reading before you can understand it.
    Fortunately, this is not an average SQL injection paper, and I realize that you don’t need
    another step between you and learning how to SQL inject. I hope you enjoy this
    uncommonly easy to read and apply paper on SQL injections.
    Watch your back, your packetz will belong to me soon... xD

    BackTrack :
    Giving Machine Guns to Monkeys since 2006

  2. #2
    My life is this forum thorin's Avatar
    Join Date
    Jan 2010
    Posts
    2,629

    Default

    I started to read it but then I came across this:
    SQL is a web scripting (computer) language.
    and was completely turned off.

    It just gets worse and worse, they try to describe how SQL works but end up describing one potential architecture of an authentication mechanism using SQL to access the backend DB. I couldn't go futher than page 3.

  3. #3
    Senior Member streaker69's Avatar
    Join Date
    Jan 2010
    Location
    Virginville, BlueBall, Bird In Hand, Intercourse, Paradise, PA
    Posts
    3,535

    Default

    Quote Originally Posted by thorin View Post
    I started to read it but then I came across this:
    and was completely turned off.

    It just gets worse and worse, they try to describe how SQL works but end up describing one potential architecture of an authentication mechanism using SQL to access the backend DB. I couldn't go futher than page 3.
    Did they even bother to state what SQL stands for?
    A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.

  4. #4
    Junior Member
    Join Date
    Aug 2007
    Posts
    40

    Default

    Quote Originally Posted by streaker69 View Post
    Did they even bother to state what SQL stands for?
    They did...

    I made it a little further then Thorin did. I made it up to the point where it said, "On every SQL server there will be an "INFORMATION_SCHEMA" and it's name will never change." I think you would have a difficult time finding a "INFORMATION_SCHEMA" table in MS SQL, Sybase, Oracle, etc. Seemed like it was written from the perspective that all SQL servers are MySQL servers.

    Still though, probably not a bad read for someone trying to learn about what sql injection attacks are about. I just wouldn't use it as a definitive resource on the topic.

  5. #5
    My life is this forum thorin's Avatar
    Join Date
    Jan 2010
    Posts
    2,629

    Default

    Still though, probably not a bad read for someone trying to learn about what sql injection attacks are about. I just wouldn't use it as a definitive resource on the topic.
    This is probably true, the obvious errors just turned me off and I didn't give it a chance.

  6. #6
    Junior Member cyberconsole's Avatar
    Join Date
    Aug 2007
    Posts
    57

    Default

    Just curious to see if anyone else has a good SQL injection or Web App Security tutorial/manual/walkthrough. On my quest to develop my pentest skills I kindof but web apps toward the back because its the most unfamiliar of the domains. I figured its time to start taking a look especially since my bank was hacked last week! hah.

    I'm looking to dive into XSS, PHP, SQL injection and Javascript vulnerabilites. Any resource material would be much appreciated. Also if anyone has had experience with setting up labs for this type of stuff I would like to bounce ideas with you.

    Thanx
    There's no fate but what we make for ourselves.

    -I already know I cant spel-

  7. #7
    My life is this forum thorin's Avatar
    Join Date
    Jan 2010
    Posts
    2,629

    Default

    Some blogs worth checking (IMHO):
    http://jeremiahgrossman.blogspot.com/
    http://www.jungsonnstudios.com/blog/

    Papers worth checking:
    http://csrc.nist.gov/publications/index.html
    http://www.cyber-knowledge.net/blog/...ace-passwords/
    (This is Canadian, I'm sure there are equivalent docs for the US and other coutries that are available)
    http://www.cse-cst.gc.ca/it-sec/it-tech-e.html
    http://www.cse-cst.gc.ca/it-sec/networks-e.html

    Other Info Sites/Resources:
    http://www.irongeek.com/
    http://www.pracdev.org/m0diphyd/index.php
    http://www.vulnerabilityassessment.co.uk/index.htm
    http://msdn2.microsoft.com/en-us/security/aa973814.aspx
    http://packetstormsecurity.org/
    http://isc.sans.org/diary.html?storyid=1229
    http://www.ethicalhacker.net/content/view/79/1/
    http://ha.ckers.org/blog/
    http://www.ex-parrot.com/~pete/upside-down-ternet.html < Wireless Revenge...too funny.
    http://www.kottke.org/06/10/google-code-search

    http://www.i-hacked.com/content/view/231/42/
    http://www.tazforum.thetazzone.com/viewtopic.php?t=2069
    http://www.wirelessdefence.org/
    http://www.perrygeo.net/wordpress/?p=55

    Books:

    http://www.amazon.com/exec/obidos/tg...01418?v=glance
    http://www.cl.cam.ac.uk/~rja14/book.html (Online Book)

    Edit: As far as Web App security goes you might want to check and see if Watchfire, SPI Dynamics, or Cenzic are planning any demos etc. I've attended Webinars from all 3 before and they're worth seeing sometimes. (Sometimes too product oriented sometimes not....kinda hit and miss).

    Also WebGoat is worth a try to get your hands dirty, it helps to get you in the right mindset. http://www.owasp.org/index.php/Categ...ebGoat_Project

  8. #8
    Junior Member cyberconsole's Avatar
    Join Date
    Aug 2007
    Posts
    57

    Default

    Wow thanks man. Looks like im going to have some fun this weekend
    There's no fate but what we make for ourselves.

    -I already know I cant spel-

  9. #9
    My life is this forum thorin's Avatar
    Join Date
    Jan 2010
    Posts
    2,629

    Default

    No problem, I was just glad to see someone actually wanting to read and do research for once.

  10. #10
    Developer
    Join Date
    Mar 2007
    Posts
    6,126

    Default

    BosDates v3.2 and CubeCart 2.0.1 are both apps thet are vunerable to SQL injection that you can download and practice on. Backtrack has a very nice suite of tools for SQL injection. Milworm also has some good papers in the archives.

Page 1 of 6 123 ... LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •