Professional Documents
Culture Documents
INJECTION ATTACK
INDEX
What is SQL
What is SQLi?
Impact of SQLi
SQLi Process
Proposed Approach
Now, if this authenticated user make any intrusion into the system. How can we
defend it?
WHAT IS SQL?
SQL stands for Structured Query Language
Allows us to access a database
ANSI and ISO standard computer language
The most current standard is SQL99
SQL can:
Union Query:
By this technique, attackers join injected query to the safe query by the word
UNION and then can get data about other tables from the application.
Piggy-backed Queries:
In this type of attack, intruders exploit database by the query delimiter, such
as ";", to append extra query to the original query.So attacker can inject any
SQL command to the database.
Stored Procedure:
Inference:
By this type of attack, intruders change the behaviour of a database or application.
There are two well known attack techniques that are based on inference:
Blind Injection: Sometimes developers hide the error details which help attackers to
compromise the database
Timing Attacks: A timing attack lets an attacker gather information from a database
by observing timing delays in the database's responses.
This technique by using if-then statement cause the SQL engine to execute a long
running query or a time delay statement depending on the logic injected.
IMPACT OF SQLi
Data loss or corruption
Data leakage
DoS
Sometimes take to complete host takeover
Reputation can be harmed
PROPOSED APPROACH
we proposed a new scheme on SQLIA which is based on verification of
information.
This a new hybrid algorithm of prevention of SQL injection attacks. We
combine the previous two approaches and then applying the hash code with
encryption for more security purpose.
By this mechanism we can easily prevent the SQLIA and safe the web
application from any intrusion.
These hash values are calculated at runtime using store procedure when user
wants to login into the database.
Hence, if a user tries the injection to the query, and our proposed
methodology is working with SQL query, it will automatically detect the
injections as the potentially harmful content and rejects the values.
Therefore, it cannot bypass the authentication process.
Now even if the dispatcher user can able to see the atm_pin by using
union operation, he cannot able to decrypt it without knowing the exact
encryption method and encryption- key. So he cannot able to do any
damage with that encrypted atm_pin.
MECHANISM
ADVANTAGES OF APPROACH
The advantage of the proposed technique is that the hackers do not
know about the hash values of user name and password.
So, it is not possible for the hacker to bypass the authentication
process through the general SQL injection techniques.
REFERENCES
A lot of SQL Injection related papers
http://www.nextgenss.com/papers.htm
http://www.ijsce.org/attachments/File/v2i6/F1147112612.pdf
http://www.spidynamics.com/support/whitepapers/
http://www.appsecinc.com/techdocs/whitepapers.html
http://www.atstake.com/research/advisories
Other resources
http://www.owasp.org
http://www.sqlsecurity.com
http://www.securityfocus.com/infocus/1768
THANKYOU