+ All Categories
Home > Documents > Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013.

Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013.

Date post: 13-Jan-2016
Category:
Upload: douglas-sparks
View: 213 times
Download: 0 times
Share this document with a friend
Popular Tags:
17
Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013
Transcript
Page 1: Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013.

Hands-on SQL Injection Attack and Defense

Winter ICT Educator Conference

Jan. 3-4, 2013

Page 2: Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013.

Bio

Page 3: Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013.

How Important is SQL Injection?

Page 4: Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013.

• SQL injection continues to reign as hackers' most consistently productive technique for stealing massive dumps of sensitive information within corporate databases.

• In fact, according to analysis done by database security firm Imperva of breach events between 2005 and July of this year, 82 percent of lost data due to hacking was courtesy of SQL injection.

• http://www.darkreading.com/database-security/167901020/security/news/240006491/hacktivists-continue-to-own-systems-through-sql-injection.html

Page 5: Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013.

• http://news.techworld.com/security/3331283/barclays-97-percent-of-data-breaches-still-due-to-sql-injection/

Page 6: Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013.

• In 2008 SQL Injection became the leading method of malware distribution

• 16 percent of websites are vulnerable to SQL Injection

• http://jeremiahgrossman.blogspot.com/2009/02/sql-injection-eye-of-storm.html

Page 7: Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013.
Page 8: Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013.

Are You Vulnerable?

Page 9: Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013.

Example SQL Injection Vulnerability

Page 10: Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013.
Page 11: Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013.
Page 12: Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013.
Page 13: Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013.

The Commands Used to Steal the Data

Page 14: Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013.

Data Breach

Page 15: Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013.
Page 16: Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013.

Hands-On SQL Injection Project

• http://samsclass.info/124/proj11/SQLi-MPICT.htm

Page 17: Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013.

Series of Projects


Recommended