Guest User

table of contents

a guest
Jul 26th, 2016
71
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.45 KB | None | 0 0
  1. Hacking Databases with SQL Injection
  2. Introduction to this Workshop
  3. What Is SQL Injection?
  4. Purpose
  5. Acknowledgements
  6. Configuration & Orientation
  7. Motivation
  8. SQL Orientation
  9. Basic Navigation
  10. Basic Queries
  11. Select
  12. Paging clause: limiting results per query
  13. The WHERE Clause and Conditional Nuances
  14. The ORDER BY Clause
  15. The GROUP BY Clause
  16. Update
  17. Delete
  18. Insert
  19. Subquery Support
  20. The Anatomy of an Injection
  21. How Web Applications Interact with SQL Services
  22. Problems with SQL-oriented Code
  23. HTTP Attack Vectors
  24. GET Variables
  25. POST Variables
  26. Request Headers & Cookies
  27. Example Injection Explained
  28. Obstacles & Countermeasures
  29. Environmental Obstacles
  30. Database Server Configuration
  31. Webserver & Interpreter Configuration
  32. Network & Webserver Restrictions
  33. Inappropriate Sanitizing
  34. Partially Sanitized Syntax Characters
  35. Home-brewed Sanitizing Algorithms
  36. Deprecated Sanitizing Functions & Configurations
  37. Testing
  38. Traditional Testing
  39. Syntax-character Driven Testing Theory
  40. Determining a Valid Whitespace
  41. Isolating Stripping
  42. Testing for Parenthesis
  43. Mathematical Operator Tests
  44. Bareword Filters
  45. Stripping Order
  46. Remote Type Checking
  47. Escaping the Escape
  48. Enumerating Valid Comparison Operators
  49. Testing with Between ... And ...
  50. Testing with Regular Expressions
  51. The Basics Of Regex
  52. Regex Vulnerability Testing Examples
  53. Testing with Timing Functions
  54. Avoiding the Need For Specific Characters
  55. Whitespace
  56. Standard quotations/apostrophes
  57. String concatenation
  58. Other methods of representing strings
  59. Tags or greater than/less than
  60. Equal signs
  61. Commas
  62. Parenthesis
  63. Information Gathering
  64. Basic Database Context
  65. Remote Dataserver Version Fingerprinting
  66. Current Database User
  67. Current Database Name
  68. Current Privileges
  69. Support For Stacked Queries
  70. Navigating the Unfamiliar Database
  71. Retrieving a List Of Databases
  72. Retrieving a List Of Tables and Columns
  73. In-band Data Retrieval
  74. Performing In-Band Injections By Appending Data
  75. Required Conditions
  76. Determining the Number of Columns
  77. Truncating the Results Set
  78. Appending Desired Data
  79. Other Clause Injections
  80. Verbose Errors
  81. Determining If Verbose Errors Are Enabled
  82. Methods Of Returning Query Results in an Error Message
  83. Second Order Injection
  84. Injected Query Output Injections
  85. Determining the number of columns in the secondary query
  86. Breaking out of blind
  87. Stored Data Re-use Injections
  88. Extracting Data From Out-Of-Band Injections
  89. Blind Data Retrieval Process
  90. Row Counting Functions
  91. Obtaining the Length of a Cell
  92. Casting, Encoding & Compressing
  93. Counting in Binary
  94. Partially Blind Injections
  95. Boolean Enumeration Using Output Comparison
  96. The Boolean Enumeration Logarithm
  97. The Guess-A-Number Algorithm
  98. Enumeration With Between ... And ...
  99. Enumeration Through Regular Expressions
  100. Bitwise Extraction With Comparative Precomputation
  101. The Comparative Precomputation Algorithm
  102. Injected Query Discovery
  103. The Bitwise Extraction Logarithm
  104. Creating the Subquery
  105. Bitwise Extraction Procedures
  106. Completely Blind Injections
  107. Boolean Enumeration Using Timing Comparison
  108. Timing Extraction With Sleep Functions
  109. Patching
  110. Paramaterized Queries & Configuration
  111. Example of PHP PDO Parameterized Queries (MySQL) using Named Placeholders
  112. Example of PHP PDO Parameterized Queries (MySQL) using QuestionMark Placeholders
  113. Explicit typecasts, encoding, and escaping
  114. Appendix
  115. Syntax Reference/Cheat Sheet
  116. Example extreme edge case script
  117. SQL Syntax characters
  118. Potential escape sequences
  119. Valid whitespace characters
  120. Conditional operators
  121. Comparison operators
  122. Query terminators
  123. Other useful syntax
  124. Multi-byte characters ending in escape
  125. Character set inspection script
  126. Basic Proof-of-concept Scripts
  127. Related Tools
  128. Resources, references, links, et al.
Add Comment
Please, Sign In to add comment