Database security attack reference and protective guidelines

Database auditing

Absinthe – http://www.0×90.org/releases/absinthe/ – a gui-based tool that automates the process of downloading the schema & contents of a database that is vulnerable to Blind SQL Injection. Absinthe does not aid in the discovery of SQL Injection holes. This tool will only speed up the process of data recovery.

DB Audit Free Edition – http://www.softtreetech.com/

Pangolin – http://www.nosec.org/

SQL Map – http://sqlmap.sourceforge.net/

| http://brainfoldsecurity.com/2010/03/15/sqlmap-open-source-pentest-tool/ – … an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of back-end database servers. It comes with a broad range of features lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections. … | http://sqlmap.sourceforge.net/index.html | http://www.slideshare.net/inquis/presentations | http://brainfoldb4u.wordpress.com/2010/03/15/netwox-graphical-front-end-network-tool/

Wapiti – http://wapiti.sourceforge.net/

10-sql-injection-tools-for-database-pwnage

 

Misc info

SQL Injection Cheat Sheet – http://ferruh.mavituna.com/sql-injection-cheatsheet-oku/

SQL Injection Cheat Sheet – http://www.byakuya-shobo.co.jp/hj/2007_05_SQLcheat.html

SQL Injection Cheat Sheets:
DB2 http://pentestmonkey.net/blog/db2-sql-injection-cheat-sheet/

Informixhttp://pentestmonkey.net/blog/informix-sql-injection-cheat-sheet/
Ingreshttp://pentestmonkey.net/blog/ingres-sql-injection-cheat-sheet/
MSSQLhttp://pentestmonkey.net/blog/mssql-sql-injection-cheat-sheet/
Oraclehttp://pentestmonkey.net/blog/oracle-sql-injection-cheat-sheet/
Postgreshttp://pentestmonkey.net/blog/postgres-sql-injection-cheat-sheet/

XSS Cheatsheet – http://grendel-scan.com/resources.htm

Small online converter generating CHAR() and hex codes for SQL injections – http://wocares.com/noquote.php

Protection Guidelines

SQL Injection Programming Help and Protection – http://www.cheergallery.com/SQLInjectionHelp.html

Preventing SQL Injections in ASP – http://msdn.microsoft.com/en-us/library/cc676512.aspx

Tools by Mark Woan – http://www.woany.co.uk/

The Connection String Reference – http://www.connectionstrings.com/

“Oracle Database Firewall To Replace DAM? Not So Fast, Competitors Say” by Ericka Chickowski (Dark Reading; 2011.02.15) – http://www.darkreading.com/database-security/167901020/security/perimeter-security/229218707/index.html – AppSec, Guardium disagree with Oracle’s assertion that database firewalls can act as a DAM substitute.

“Clearing The Air On DAM” by Adrian Lane (Dark Reading; 2011.02.23) – http://www.darkreading.com/taxonomy/index/printarticle/id/229219182 – There are two very important things to understand: First, a database firewall and a database activity monitor (DAM) are exactly the same things! Second, a database firewall can upset normal IT operations.

crossposted from Eikonal Blog

Advertisements

About wikihead

A security freak
This entry was posted in Articles, Notes and tagged , , . Bookmark the permalink.

One Response to Database security attack reference and protective guidelines

  1. Pingback: Pro Blogger News

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s