git-svn-id: http://webgoat.googlecode.com/svn/trunk@58 4033779f-a91e-0410-96ef-6bf7bf53c507
23 lines
1.1 KiB
HTML
23 lines
1.1 KiB
HTML
<div align="Center">
|
|
<p><b>Lesson Plan Title:</b> How to Create Database Back Door Attacks.</p>
|
|
</div>
|
|
|
|
<p><b>Concept / Topic To Teach:</b> </p>
|
|
How to Create Database Back Door Attacks.
|
|
<br>
|
|
<div align="Left">
|
|
<p>
|
|
<b>How the attacks works:</b>
|
|
</p>
|
|
Database are used usually as a backend for web applications. Also it is used as a media of storage. It can also
|
|
be used as a place to store a malacious activity such as a trigger. A trigger is called by the database management
|
|
system upon the execution of another database operation like insert, select, update or delete. An attacker for example
|
|
can create a trigger that would set his email address instead of every new user's email address.
|
|
</div>
|
|
<p><b>General Goal(s):</b> </p>
|
|
<!-- Start Instructions -->
|
|
* Your goal should be to learn how you can exploit a vulnerable query to create a trigger.<br>
|
|
* You will not be able to actually create one in this lesson because the underlying database engine used with WebGoat doesn't support triggers.<br>
|
|
* Your login ID is 101.
|
|
<!-- Stop Instructions -->
|