Often the websites related to security issues, the user will be logged properly if users log in to your account, they will be in correct your database but do not have an account Hacker. Hacker will do so through the system to lot login. We see the underlying code is written in the form log on.
sqlquery = "SELECT FROM User WHERE csdlUsername csdlUsername = '' & strUsername &" 'AND Password =' '& csdlPassword &' '' '
flag = GetQueryResult ( SQLQuery)
if flag = "" then
check = FALSE
else
check = TRUE
end
...
The above code checks Username and Password string. If you enter the correct account and password will check = true and the reverse is checked = false. Hackers do not have an account yet discovered flaw in his forum login and type the username and password as 'OR' '=' as Figure 3.10. Then the code in combination with bananas form Hacker will enter into such.
SELECT FROM User WHERE csdlUsername csdlUername = '' OR '' = '' AND Password '' OR '' = ''
Analyzing this question:
csdlUsername '': do not enter anything, FALSE enter
'' = '': This clause is TRUE
Password ': do not enter, it will not in csdlpassword then FALSE
'' = '' This clause is TRUE
Then I reconsider as follows: (F or T) and (F or T) => T and T. With the above structure, the Hacker completely break into the system without any account. After a successful login, the system will switch to first account in the database of the system. The next could be explored Hacker account or offensive will continue into other accounts or to snoop on accounts with the system is the best in the Admin.
This is just the most basic ones of SQL Injection, it can attack with a statement such as SELECT, HAVING, INSERT, ...
2.5.2 Some security measures to overcome
the attacking SQL Injection based on the error message so the room The most effective control is not to display the system error messages to the user instead of an error by the programmer or administrator development design whenever an error occurs on the application.
Double check values entered by the user, the special character, ...
Get rid of the letters ", ',", /, ,;, "and the keywords as NULL, CR, LF, ...
Use the POST method and encryption URL bar of the browser client.
Isolate the database server and WEB server client's words, the database server is not installed on the Web server to ensure security.
It should be used account with low privileges to access the database. Means not necessarily have to spend when the right or Root Admin which should decentralize the User right for the purpose of work, true to the intention of the administrator.
2.6 ENFORCEMENT IN ORDER TO INSERT THE CODE BROWSE VICTIMS (Cross Site Scripting)
attack technique 2.6.1
Technique Cross Site Scripting attacks (XSS for short) is the method of attack by inserting pieces of code have the ability to steal or set the important information such as cookies, passwords, ... at source web applications so that they are run as part of WEB applications and functionality provided or practices Hacker want.
Methodology This is not aimed at the server of the system that mainly attacks on the user machine. Hacker will take advantage of less stringent examination of applications and limited understanding of users as well as curious to know their type in the user leading to lost information with ease.
This attack technique is a in the attack technique most popular Web applications and their threats against users is growing.
Hacker attacks WEB application server information
Hacker uses XSS vulnerability scanning tools for WEB application server. On a beautiful day, Hacker also found a WEB application server and therefore fails XSS Hacker load Scrip (script) on the WEB server and WEB server through the client on the site of application WEB she may lose the personal information was obtained by the hacker, the following will describe the process of implementation.
đang được dịch, vui lòng đợi..