Merge branch 'JeffreyWagnerBHN-develop' into develop
This commit is contained in:
commit
7a4f6e6fd3
@ -1,26 +1,26 @@
|
||||
== Compromising confidentiality with String SQL injection
|
||||
If a system is vulnerable to SQL injections it is also easy to compromise aspects of the CIA triad _(if you are unfamiliar with the CIA triad check out the CIA triad lesson in the general category)_.
|
||||
In the following three lessons, you will learn how to use simple SQL injection attacks to compromise each of the three. Per example by using _SQL string injections_ or _query chaining_.
|
||||
If a system is vulnerable to SQL injections, aspets of that system's CIA triad can be easily compromoised _(if you are unfamiliar with the CIA triad, check out the CIA triad lesson in the general category)_.
|
||||
In the following three lessons you will learn how to compromise each aspect of the CIA triad using teachniques like _SQL string injections_ or _query chaining_.
|
||||
|
||||
This lesson, we will take a look at *confidentiality*.
|
||||
Confidentiality can easily be compromised if an attacker uses SQL injection to read sensitive data from the database. For example reading credit card numbers or passwords.
|
||||
In this lesson we will look at *confidentiality*.
|
||||
Confidentiality can be easily compromised by an attacker using SQL injection to read sensitive data like credit card numbers from a database.
|
||||
|
||||
=== What is String SQL injection?
|
||||
If queries are build dynamically in the application by concatenating strings to it, this makes it very susceptible to String SQL injection. +
|
||||
If the input takes a string and that one gets inserted into the query as a string parameter, then you can easily manipulate the build query by using quotation marks to form the string to your specific needs.
|
||||
You could per example end the string parameter with it and input your own SQL after that.
|
||||
If queries are built dynamically in the application by concatenating strings to it, this makes it very susceptible to String SQL injection. +
|
||||
If the input takes a string that gets inserted into a query as a string parameter, then you can easily manipulate the build query using quotation marks to form the string to your specific needs.
|
||||
For example, you could end the string parameter with quotation marks and input your own SQL after that.
|
||||
|
||||
=== It is your turn!
|
||||
You are an employee named John *Smith* working for a big company.
|
||||
The company has an internal system that allows all employees to see their own internal data, like the department they work in and their salary.
|
||||
The company has an internal system that allows all employees to see their own internal data - like the department they work in and their salary.
|
||||
|
||||
The system requires the employees to use a unique _authentication TAN_ to view their data. +
|
||||
Your current TAN is *3SL99A*.
|
||||
|
||||
Since you always have the urge to be the most earning employee you want to exploit the system and instead of viewing your own internal data _take a look at the data of all your colleagues_ to check their current salaries.
|
||||
Since you always have the urge to be the most earning employee, you want to exploit the system and instead of viewing your own internal data, _ you want to take a look at the data of all your colleagues_ to check their current salaries.
|
||||
|
||||
Use the form below and try to retrieve all the employee data from the *employees* table. You should not need to know any specific names or TANs to get the information you need. +
|
||||
You already found out that the query performing your request looks like that:
|
||||
Use the form below and try to retrieve all employee data from the *employees* table. You should not need to know any specific names or TANs to get the information you need. +
|
||||
You already found out that the query performing your request looks like this:
|
||||
------------------------------------------------------------
|
||||
"SELECT * FROM employees WHERE last_name = '" + name + "' AND auth_tan = '" + auth_tan + "';
|
||||
------------------------------------------------------------
|
Loading…
x
Reference in New Issue
Block a user