Nytro Posted August 14, 2012 Report Posted August 14, 2012 Practical Identification of SQLInjection VulnerabilitiesArticol al celor de la CERT-US.by Chad DoughertyBackground and MotivationThe class of vulnerabilities known as SQL injection continues to present an extremely high riskin the current network threat landscape. In 2011, SQL injection was ranked first on the MITRECommon Weakness Enumeration (CWE)/SANS Top 25 Most Dangerous Software Errors list.1Exploitation of these vulnerabilities has been implicated in many recent high-profile intrusions.Although there is an abundance of good literature in the community about how to prevent SQLinjection vulnerabilities, much of this documentation is geared toward web applicationdevelopers. This advice is of limited benefit to IT administrators who are merely responsible forthe operation of targeted web applications. In this document, we will provide concrete guidanceabout using open source tools and techniques to independently identify common SQL injectionvulnerabilities, mimicking the approaches of attackers at large. We highlight testing tools andillustrate the critical results of testing.Download:http://www.us-cert.gov/reading_room/Practical-SQLi-Identification.pdf Quote