hands-on sql injection attack and defense winter ict educator conference jan. 3-4, 2013

17
Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013

Upload: douglas-sparks

Post on 13-Jan-2016

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013

Hands-on SQL Injection Attack and Defense

Winter ICT Educator Conference

Jan. 3-4, 2013

Page 2: Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013

Bio

Page 3: Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013

How Important is SQL Injection?

Page 4: Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013

• SQL injection continues to reign as hackers' most consistently productive technique for stealing massive dumps of sensitive information within corporate databases.

• In fact, according to analysis done by database security firm Imperva of breach events between 2005 and July of this year, 82 percent of lost data due to hacking was courtesy of SQL injection.

• http://www.darkreading.com/database-security/167901020/security/news/240006491/hacktivists-continue-to-own-systems-through-sql-injection.html

Page 5: Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013

• http://news.techworld.com/security/3331283/barclays-97-percent-of-data-breaches-still-due-to-sql-injection/

Page 6: Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013

• In 2008 SQL Injection became the leading method of malware distribution

• 16 percent of websites are vulnerable to SQL Injection

• http://jeremiahgrossman.blogspot.com/2009/02/sql-injection-eye-of-storm.html

Page 7: Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013
Page 8: Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013

Are You Vulnerable?

Page 9: Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013

Example SQL Injection Vulnerability

Page 10: Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013
Page 11: Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013
Page 12: Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013
Page 13: Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013

The Commands Used to Steal the Data

Page 14: Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013

Data Breach

Page 15: Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013
Page 16: Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013

Hands-On SQL Injection Project

• http://samsclass.info/124/proj11/SQLi-MPICT.htm

Page 17: Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013

Series of Projects