Database security attack reference and protective guidelines

Database auditing

Absinthe – http://www.0× – a gui-based tool that automates the process of downloading the schema & contents of a database that is vulnerable to Blind SQL Injection. Absinthe does not aid in the discovery of SQL Injection holes. This tool will only speed up the process of data recovery.

DB Audit Free Edition –

Pangolin –

SQL Map –

| – … an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of back-end database servers. It comes with a broad range of features lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections. … | | |

Wapiti –



Misc info

SQL Injection Cheat Sheet –

SQL Injection Cheat Sheet –

SQL Injection Cheat Sheets:


XSS Cheatsheet –

Small online converter generating CHAR() and hex codes for SQL injections –

Protection Guidelines

SQL Injection Programming Help and Protection –

Preventing SQL Injections in ASP –

Tools by Mark Woan –

The Connection String Reference –

“Oracle Database Firewall To Replace DAM? Not So Fast, Competitors Say” by Ericka Chickowski (Dark Reading; 2011.02.15) – – AppSec, Guardium disagree with Oracle’s assertion that database firewalls can act as a DAM substitute.

“Clearing The Air On DAM” by Adrian Lane (Dark Reading; 2011.02.23) – – There are two very important things to understand: First, a database firewall and a database activity monitor (DAM) are exactly the same things! Second, a database firewall can upset normal IT operations.

crossposted from Eikonal Blog


About Uma Mahesh

A Creator/Equilizer. Creator/Equalizers are catalysts for positive, well-organized change. They never settle for the status quo. Instead, they see the opportunity for innovation in the processes that others have long taken for granted. They respect what's already operating, but they can't help but want to improve upon it. Their special combination provides innovation tempered with profound logic. They have incredible discernment. Should their efforts fail, they are unhesitating in accepting responsibility. They don't wallow in self-pity but rather see these missed attempts as critical steps on the path to success.
This entry was posted in Articles, Notes and tagged , , . Bookmark the permalink.

One Response to Database security attack reference and protective guidelines

  1. Pingback: Pro Blogger News

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s