io.kent Posted September 17, 2012 Report Posted September 17, 2012 Chapter 1 What Is SQL Injection?1-Introduction2-Understanding How Web Applications Work.3-A Simple Application Architecture4-A More Complex Architecture5-Understanding SQL Injection6-High-Profile Examples7-Understanding How It Happens8-Dynamic String Building9-Incorrectly Handled Escape Characters10-Incorrectly Handled Types11-Incorrectly Handled Query Assembly12-Incorrectly Handled Errors13-Incorrectly Handled Multiple Submissions14-Insecure Database Configuration15-Summary16-Solutions Fast Track17-Frequently Asked QuestionsChapter 2 Testing for SQL Injection1-Introduction2-Finding SQL Injection3-Testing by Inference4-Identifying Data Entry5-GET Requests6-POST Requests7-Other Injectable Data8-Manipulating Parameters9-Information Workf low10-Database Errors11-Commonly Displayed SQL Errors12-Microsoft SQL Server Errors13-MySQL Errors14-Oracle Errors15-Generic Errors16-HTTP Code Errors17-Different Response Sizes18Blind Injection Detection19-Confirming SQL Injection20-Differentiating Numbers and Strings21-Inline SQL Injection22-Injecting Strings Inline23-Injecting Numeric Values Inline24-Terminating SQL Injection25-Database Comment Syntax26-Using Comments27-Executing Multiple Statements28-Time Delays29-Automating SQL Injection Discovery30-Tools for Automatically Finding SQL Injection31-HP WebInspect32-IBM Rational AppScan33-HP Scrawlr34-SQLiX35-Paros Proxy36-Summary37-Solutions Fast Track38-Frequently Asked QuestionsChapter 3 Reviewing Code for SQL Injection1-Introduction2-Reviewing Source Code for SQL Injection3-Dangerous Coding Behaviors4-Dangerous Functions5-Following the Data6-Following Data in PHP7-Following Data in Java8-Following Data in C#9-Reviewing PL/SQL and T-SQL Code10-Automated Source Code Review11-Yet Another Source Code Analyzer12-Pixy13-AppCodeScan14-LAPSE15-Security Compass Web Application Analysis Tool (SWAAT)16-Microsoft Source Code Analyzer for SQL Injection17-Microsoft Code Analysis Tool .NET (CAT.NET)18-Commercial Source Code Review Tools19-Ounce20-Source Code Analysis21-CodeSecure22-Summary23-Solutions Fast Track24-Frequently Asked QuestionsChapter 4 Exploiting SQL Injection1-Introduction2-Understanding Common Exploit Techniques3-Using Stacked Queries4-Identifying the Database5-Non-Blind Fingerprint6-Banner Grabbing7-Blind Fingerprint8-Extracting Data through UNION Statements9-Matching Columns10-Matching Data Types11-Using Conditional Statements12-Approach 1: Time-based13-Approach 2: Error-based14-Approach 3: Content-based15-Working with Strings16-Extending the Attack17-Using Errors for SQL Injection18-Error Messages in Oracle19-Enumerating the Database Schema20-SQL Server21-MySQL22-Oracle23-Escalating Privileges24-SQL Server25-Privilege Escalation on Unpatched Servers26-Oracle27-Stealing the Password Hashes28-SQL Server29-MySQL30-Oracle31-Oracle Components32-APEX33-Oracle Internet Directory34-Out-of-Band Communication35-E-mail36-Microsoft SQL Server37-Oracle38-HTTP/DNS39-File System40-SQL Server41-MySQL42-Oracle43-Automating SQL Injection Exploitation44-Sqlmap45-Sqlmap Example46-Bobcat47-BSQL48-Other Tools49-Summary50-Solutions Fast Track51-Frequently Asked QuestionsChapter 5 Blind SQL Injection Exploitation1-Introduction2-Finding and Confirming Blind SQL Injection3-Forcing Generic Errors4-Injecting Queries with Side Effects5-Spitting and Balancing6-Common Blind SQL Injection Scenarios7-Blind SQL Injection Techniques8-Inference Techniques9-Increasing the Complexity of Inference Techniques10-Alternative Channel Techniques11-Using Time-Based Techniques12-Delaying Database Queries13-MySQL Delays14-Generic MySQL Bit-by-Bit Inference Exploits15-SQL Server Delays16-Generic SQL Server Binary Search Inference Exploits17-Generic SQL Server Bit-by-Bit Inference Exploits18-Oracle Delays19-Time-Based Inference Considerations20-Using Response-Based Techniques21-MySQL Response Techniques22-SQL Server Response Techniques23-Oracle Response Techniques24-Returning More Than One Bit of Information25-Using Alternative Channels26-Database Connections27-DNS Exfiltration28-E-mail Exfiltration29-HTTP Exfiltration30-Automating Blind SQL Injection Exploitation31-Absinthe32-BSQL Hacker33-SQLBrute34-Sqlninja35-Squeeza36-Summary37-Solutions Fast Track38-Frequently Asked QuestionsChapter 6 Exploiting the Operating System1-Introduction2-Accessing the File System3-Reading Files4-MySQL5-Microsoft SQL Server6-Oracle7-Writing Files8-MySQL9-Microsoft SQL Server10-Oracle11-Executing Operating System Commands12-Direct Execution13-Oracle14-DBMS_SCHEDULER15-PL/SQL Native16-Other Possibilities17-Alter System Set Events18-PL/SQL Native 9i19-Buffer Overflows20-Custom Application Code21-MySQL22-Microsoft SQL Server23-Consolidating Access24-Summary25-Solutions Fast Track26-Frequently Asked Questions27-EndnotesChapter 7 Advanced Topics1-Introduction2-Evading Input Filters3-Using Case Variation4-Using SQL Comments5-Using URL Encoding6-Using Dynamic Query Execution7-Using Null Bytes8-Nesting Stripped Expressions9-Exploiting Truncation10-Bypassing Custom Filters11-Using Non-Standard Entry Points12-Exploiting Second-Order SQL Injection13-Finding Second-Order Vulnerabilities14-Using Hybrid Attacks15-Leveraging Captured Data16-Creating Cross-Site Scripting17-Running Operating System Commands on Oracle18-Exploiting Authenticated Vulnerabilities19-Summary20-Solutions Fast Track21-Frequently Asked QuestionsChapter 8 Code-Level Defenses1-Introduction2-Using Parameterized Statements3-Parameterized Statements in Java4-Parameterized Statements in .NET (C#)5-Parameterized Statements in PHP6-Parameterized Statements in PL/SQL7-Validating Input8-Whitelisting9-Blacklisting10-Validating Input in Java11-Validating Input in .NET12-Validating Input in PHP13-Encoding Output14-Encoding to the Database15-Encoding for Oracle16-Oracle dbms_asser17-Encoding for Microsoft SQL Server18-Encoding for MySQL19-Canonicalization20-Canonicalization Approache21-Working with Unicode22-Designing to Avoid the Dangers of SQL Injection23-Using Stored Procedures24-Using Abstraction Layers25-Handling Sensitive Data26-Avoiding Obvious Object Names27-Setting Up Database HoneypotsChapter 9 Reference1-Introduction2-Structured Query Language (SQL) Primer3-SQL Queries4-SELECT Statement5-UNION Operator6-INSERT Statement7-UPDATE Statement8-DELETE Statement9-*zensiert* Statement10-CREATE TABLE Statement11-ALTER TABLE Statement12-GROUP BY Statement13-ORDER BY Clause14-Limiting the Result Set15-SQL Injection Quick Reference16-Identifying the Database Platform17-Identifying the Database Platform via Time Delay Inference18-Identifying the Database Platform via SQL Dialect Inference19-Combining Multiple Rows into a Single Row20-Microsoft SQL Server Cheat Sheet.21-Blind SQL Injection Functions: Microsoft SQL Server22-Microsoft SQL Server Privilege Escalation23-OPENROWSET Reauthentication Attack24-Attacking the Database Server: Microsoft SQL Server25-System Command Execution via xp_cmdshell26-xp_cmdshell Alternative27-Cracking Database Passwords28-Microsoft SQL Server 2005 Hashes29-File Read/Write30-MySQL Cheat Sheet31-Enumerating Database Configuration Information and Schema32-Blind SQL Injection Functions: MySQL33-Attacking the Database Server: MySQL34-System Command Execution35-Cracking Database Passwords36-Attacking the Database Directly37-File Read/Write38-Oracle Cheat Sheet39-Enumerating Database Configuration Information and Schema40-Blind SQL Injection Functions: Oracle41-Attacking the Database Server: Oracle42-Command Execution43-Reading Local Files44-Reading Local Files (PL/SQL Injection Only)45-Writing Local Files (PL/SQL Injection Only)46-Cracking Database Passwords47-Bypassing Input Validation Filters48-Quote Filters49-HTTP Encoding50-Troubleshooting SQL Injection Attacks51-SQL Injection on Other Platforms52-PostgreSQL Cheat Sheet53-Enumerating Database Configuration Information and Schema54-Blind SQL Injection Functions: PostgreSQL55-Attacking the Database Server: PostgreSQL56-System Command Executio57-Local File Access58-Cracking Database Passwords59-DB2 Cheat Sheet60-Enumerating Database Configuration Information and Schema61-Blind SQL Injection Functions: DB262-Informix Cheat Sheet63-Enumerating Database Configuration Information and Schema64-Blind SQL Injection Functions: Informix65-Ingres Cheat Sheet66-Enumerating Database Configuration Information and Schema67-Blind SQL Injection Functions: Ingres68-Microsoft Access69-Resources70-SQL Injection White Papers71-SQL Injection Cheat Sheets72-SQL Injection Exploit Tools73-Password Cracking Tools74-Solutions Fast TrackDownload : _Bible_of_the_SQL-Injection.rar"]http://www.mediafire.com/file/77b6x7y4f1dn41x/[E-Book]_Bible_of_the_SQL-Injection.rar 2 Quote