SQL Injection Attack Lab
|
|
|
- Cecily Richard
- 10 years ago
- Views:
Transcription
1 Laboratory for Computer Security Education 1 SQL Injection Attack Lab Copyright c Wenliang Du, Syracuse University. The development of this document is funded by the National Science Foundation s Course, Curriculum, and Laboratory Improvement (CCLI) program under Award No and Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation. A copy of the license can be found at 1 Overview SQL injection is a code injection technique that exploits the vulnerabilities in the interface between web applications and database servers. The vulnerability is present when user s inputs are not correctly checked within the web applications before sending to the back-end database servers. Many web applications take inputs from users, and then use these inputs to construct SQL queries, so the web applications can pull the information out of the database. Web applications also use SQL queries to store information in the database. These are common practices in the development of web applications. When the SQL queries are not carefully constructed, SQL-injection vulnerabilities can occur. SQL-injection attacks is one of the most frequent attacks on web applications. In this lab, we modified a web application called phpbb, and disabled several countermeasures implemented by phpbb2. As the results, we created a version of phpbb that is vulnerable to the SQL-Injection attack. Although our modifications are artificial, they capture the common mistakes made by many web developers. Students goal in this lab is to find ways to exploit the SQL-Injection vulnerabilities, demonstrate the damage that can be achieved by the attacks, and master the techniques that can help defend against such attacks. 2 Lab Environment You need to use our provided virtual machine image for this lab. The name of the VM image that supports this lab is called SEEDUbuntu9-Aug-2010, which is built in August If you happen to have an older version of our pre-built VM image, you need to download the most recent version, as the older version does not work for this lab. Go to our SEED web page ( wedu/seed/) to get the VM image. 2.1 Environment Configuration In this lab, we will need three things: (1) the Firefox web browser, (2) the apache web server, and (3) the phpbb2 message board web application. For the browser, we need to use several Firefox add-ons to inspect and/or modify the HTTP requests and responses. The pre-built Ubuntu VM image provided to you has already installed the Firefox web browser with the required extensions. Starting the Apache Server. The apache web server is also included in the pre-built Ubuntu image. However, the web server is not started by default. You have to first start the web server using the following command: % sudo service apache2 start
2 Laboratory for Computer Security Education 2 The phpbb2 Web Application. The phpbb2 web application is already set up in the pre-built Ubuntu VM image. We have also created several user accounts in the phpbb2 server. The password information can be obtained from the posts on the front page. You can access the phpbb2 server using the following URL (the apache server needs to be started first): The source code of web application is located at /var/www/sql/sqllabmysqlphpbb/. Configuring DNS. This URL is only accessible from inside of the virtual machine, because we have modified the /etc/hosts file to map the domain name ( to the virtual machine s local IP address ( ). You may map any domain name to a particular IP address using the /etc/hosts. For example you can map to the local IP address by appending the following entry to /etc/hosts file: Therefore, if your web server and browser are running on two different machines, you need to modify the /etc/hosts file on the browser s machine accordingly to map to the web server s IP address. Configuring Apache Server. In the pre-built VM image, we use Apache server to host all the web sites used in the SEED labs. The name-based virtual hosting feature in Apache could be used to host several web sites (or URLs) on the same machine. A configuration file named default in the directory "/etc/ apache2/sites-available" contains the necessary directives for the configuration: 1. The directive "NameVirtualHost *" instructs the web server to use all IP addresses in the machine (some machines may have multiple IP addresses). 2. Each web site has a VirtualHost block that specifies the URL for the web site and directory in the file system that contains the sources for the web site. For example, to configure a web site with URL with sources in directory /var/www/example_1/, and to configure a web site with URL with sources in directory /var/www/example_2/, we use the following blocks: <VirtualHost *> ServerName DocumentRoot /var/www/example_1/ </VirtualHost> <VirtualHost *> ServerName DocumentRoot /var/www/example_2/ </VirtualHost> You may modify the web application by accessing the source in the mentioned directories. For example, with the above configuration, the web application can be changed by modifying the sources in the directory /var/www/example_1/.
3 Laboratory for Computer Security Education Turn Off the Countermeasure PHP provides a mechanism to automatically defend against SQL injection attacks. The method is called magic quote, and more details will be introduced in Task 3. Let us turn off this protection first (this protection method is deprecated after PHP version 5.3.0). 1. Go to /etc/php5/apache2/php.ini. 2. Find the line: magic quotes gpc = On. 3. Change it to this: magic quotes gpc = Off. 4. Restart the apache server by running "sudo service apache2 restart". 2.3 Note for Instructors If the instructor plans to hold lab sessions for this lab, we suggest that the following background materials be covered in the lab sessions: 1. How to use the virtual machine, Firefox web browser, the LiveHttpHeaders and Tamper Data add-ons. 2. Brief introduction to SQL: only needs to cover the basic structure of the SELECT, UPDATE, and INSERT statements. A useful online SQL tutorial can be found at com/sql/. 3. How to operate the MySQL database (only the basics). The account information about the MySQL database can be found in the User Manual of the Pre-built Ubuntu 9 Virutal Machine, which can be downloaded from our SEED web page. 4. Brief introduction to PHP: only needs to cover the very basics. Students who have a background in C/C++, Java, or other language should be able to pick up this script language quite quickly. 3 Lab Tasks 3.1 Task 1 (30 Points): SQL Injection Attack on SELECT Statements For this task, you will use the web application accessible via the URL which is phpbb2 configured with MySQL database, inside your virtual machine. Before you start to use phpbb2, the system will ask you to login. The authentication is implemented by login.php on the server side. This program will display a login window to the user and ask the user to type their username and password. The login window is displayed in the following:
4 Laboratory for Computer Security Education 4 Once the user types the username and password, the login.php program will use the userprovided data to find out whether they match with the username and user password fields of any record in the database. If there is a match, it means the user has provided a correct username and password combination, and should be allowed to login. Like most other web applications, PHP programs interact with their back-end databases using the standard SQL language. In phpbb2, the following SQL query is constructed in login.php to authenticate users: SELECT user_id, username, user_password, user_active, user_level, user_login_tries, user_last_login_try FROM USERS_TABLE WHERE username = $username AND user_password = md5($password) ; if (found one record) then {allow the user to login} In the above SQL statement, the USERS TABLE is a macro in php which will be replaced by the users table name: phpbb users, $username is a variable that holds the string typed in the Username textbox, and $password is a variable that holds the string typed in the Password textbox. User s inputs in these two textboxs are placed directly in the SQL query string. SQL Injection Attacks on Login: There is a SQL-injection vulnerability in the above query. Can you take advantage of this vulnerability to achieve the following objectives? Can you log into another person s account without knowing the correct password? Can you find a way to modify the database (still using the above SQL query)? For example, can you add a new account to the database, or delete an existing user account? Obviously, the above SQL statement is a query-only statement, and cannot update the database. However, using SQL injection, you can turn the above statement into two statements, with the second one being the update statement. Please try this method, and see whether you can successfully update the database. To be honest, we are unable to achieve the update goal. This is because of a particular defense mechanism implemented in MySQL. In the report, you should show us what you have tried in order to modify the database. You should find out why the attack fails, what mechanism in MySQL has
5 Laboratory for Computer Security Education 5 prevented such an attack. You may look up evidences (second-hand) from the Internet to support your conclusion. However, a first-hand evidence will get more points (use your own creativity to find out first-hand evidences). If in case you find ways to succeed in the attacks, you will be awarded bonus points. 3.2 Task 2 (30 Points): SQL Injection on UPDATE Statements When users want to update their profiles in phpbb2, they can click the Profile link, and then fill in a form to update the profile information. After the user sends the update request to the server, an UPDATE SQL statement will be constructed in include/usercp_register.php. The objective of this statement is to modify the current user s profile information in phpbb_users table. There is a SQL injection vulnerability in this SQL statement. Please find the vulnerability, and then use it to do the following: Change another user s profile without knowing his/her password. For example, if you are logged in as Alice, your goal is to use the vulnerability to modify Ted s profile information, including Ted s password. After the attack, you should be able to log into Ted s account. 3.3 Task 3 (40 Points): Countermeasures The fundamental problem of SQL injection vulnerability is the failure of separating code from data. When constructing a SQL statement, the program (e.g. PHP program) knows what part is data and what part is code. Unfortunately, when the SQL statement is sent to the database, the boundary has disappeared; the boundaries that the SQL interpreter sees may be different from the original boundaries, if code are injected into the data field. To solve this problem, it is important to ensure that the view of the boundaries are consistent in the server-side code and in the database. There are various ways to achieve this: this objective. Task 3.1: Escaping Special Characters using magic quotes gpc. In the PHP code, if a data variable is the string type, it needs to be enclosed within a pair of single quote symbols ( ). For example, in the SQL query listed above, we see username = $username. The single quote symbol surrounding $username basically tries to seperate the data in the $username variable from the code. Unfortunately, this separation will fail if the contents of $username include any single quote. Therefore, we need a mechanism to tell the database that a single quote in $username should be treated as part of the data, not as a special character in SQL. All we need to do is to add a backslash (\) before the single quote. PHP provides a mechanism to automatically add a backslash before single-quote ( ), double quote ("), backslash (\), and NULL characters. If this option is turned on, all these characters in the inputs from the users will be automatically escaped. To turn on this option, go to /etc/php5/apache2/ php.ini, and add magic quotes gpc = On (the option is already on in the VM provided to you). Remeber, if you update php.ini, you need to restart the apache server by running "sudo service apache2 restart"; othewise, your change will not take effect. Please turn on/off the magic quote mechanism, and see how it help the protection. Please be noted that starting from PHP (the version in our provided VM is 5.2.6), the feature has been DEPRE- CATED, due to several reasons: Portability: Assuming it to be on, or off, affects portability. Most code has to use a function called get magic quotes gpc() to check for this, and code accordingly.
6 Laboratory for Computer Security Education 6 Performance and Inconvenience: not all user inputs are used for SQL queries, so mandatory escaping all data not only affects performance, but also become annoying when some data are not supposed to be esecaped. Task 3.2: Escaping Special Characters using addslashes(). A PHP function called addslashes() can also achieve what the magic quote does. The original phpbb2 code uses addslashes() to defend against the SQL injection attacks if the magic quote is not turned on. Please look at the common.php file in /var/www/sql/sqllabmysqlphpbb (common.php is included by login.php, so it will be executed whenever login.php is executed). We actually commented out the protection in phpbb2 to make the SQL injection possible. Please turn the protection back on to see the difference by removing "and FALSE" from the the following line (we added "and False" to bypass this block of code). Please describe how this protection scheme help defend against your SQL injection attacks: if(!get_magic_quotes_gpc() and FALSE ) After removing "and False", the countermeasure within the if-block will be executed if the magic quote mechanism is turned off 1. To help describe your observations, you should print out the SQL queries, and see how the mechanism affect the queries. Please go to the guideline section to learn how to print out information in PHP programs. Task 3.3: Escaping Special Characters using mysql real escape string. A better way to escape data to defend against SQL injection is to use database specific escaping mechanisms, instead of relying upon features like magical quotes. MySQL provides an escaping mechanism, called mysql real escape string(), which prepends backslashes to a few special characters, including \x00, \n, \r, \,, " and \x1a. Please use this function to fix the SQL injection vulnerabilities identified in the previous tasks. You should disable the other protection schemes described in the previous tasks before working on this task. Task 3.4: Prepare Statement. A more general solution to separating data from SQL logic is to tell the database exactly which part is the data part and which part is the logic part. MySQL provides the prepare statement mechanism for this purpose. $db = new mysqli("localhost", "user", "pass", "db"); $stmt = $db->prepare("select * FROM users WHERE name=? AND age=?"); $stmt->bind_param("si", $user, $age); $stmt->execute(); Using the prepare statement mechanism, we divide the process of sending a SQL statement to the database into two steps. The first step is to send the code, i.e., the SQL statement without the data that need to be plugged in later. This is the prepare step. After this step, we then send the data to the database using bind param(). The database will treat everything sent in this step only as data, not as code anymore. 1 Even if the magic quote option is turned on in php.ini, a statement in the beginning of common.php turned off the magic quote at runtime. This is done using set_magic_quotes_runtime(0). That is why get_magic_quotes_gpc() will be false. It should be noted that turning on the magic quotes at runtime does not affect the inputs provided by the users (i.e., those in $ GET and $ POST). It only affects the other inputs (e.g. input from files, etc). The function set_magic_quotes_runtime() is also deprecated starting from PHP version
7 Laboratory for Computer Security Education 7 Please use the prepare statement mechanism to fix the SQL injection vulnerability in the phpbb2 code. In the bind param function, the first argument "si" means that the first parameter ($user) has a string type, and the second parameter ($age) has an integer type. 4 Guidelines Print out debugging information. When we debug traditional programs (e.g. C programs) without using any debuging tool, we often use printf() to print out some debugging information. In web applications, whatever are printed out by the server-side program is actually displayed in the web page sent to the users; the debugging printout may mess up with the web page. There are several ways to solve this problem. A simple way is to print out all the information to a file. For example, the following code snippet can be used by the server-side PHP program to print out the value of a variable to a file. $myfile = "/tmp/mylog.txt"; $fh = fopen($myfile, a ) or die("can t open file"); $Data = "a string"; fwrite($fh, $Data. "\n"); fclose($fh); A useful Firefox Add-on. Firefox has an add-on called "Tamper Data", it allows you to modify each field in the HTTP request before the request is sent to the server. For example, after clicking a button on a web page, an HTTP request will be generated. However, before it is sent out, the "Tamper Data" add-on intercepts the request, and gives you a chance to make an arbitrary change on the request. This tool is quite handy in this lab. The add-on only works for Firefox versions 3.5 and above. If your firefox has an earlier version, you need to upgrade it for this add-on. In our most recently built virtual machine image (SEEDUbuntu9-Aug- 2010), Firefox is already upgraded to version 3.6, and the "Tamper Data" add-on is already installed. 5 Submission You need to submit a detailed lab report to describe what you have done and what you have observed. You also need to provide explanation to the observations that are interesting or surprising.
SQL Injection Attack Lab Using Collabtive
Laboratory for Computer Security Education 1 SQL Injection Attack Lab Using Collabtive (Web Application: Collabtive) Copyright c 2006-2011 Wenliang Du, Syracuse University. The development of this document
SQL Injection Attack Lab
CMSC 426/626 Labs 1 SQL Injection Attack Lab CMSC 426/626 Based on SQL Injection Attack Lab Using Collabtive Adapted and published by Christopher Marron, UMBC Copyright c 2014 Christopher Marron, University
Web Same-Origin-Policy Exploration Lab
Laboratory for Computer Security Education 1 Web Same-Origin-Policy Exploration Lab (Web Application: Collabtive) Copyright c 2006-2011 Wenliang Du, Syracuse University. The development of this document
User Manual of the Pre-built Ubuntu 9 Virutal Machine
SEED Document 1 User Manual of the Pre-built Ubuntu 9 Virutal Machine Copyright c 2006-2011 Wenliang Du, Syracuse University. The development of this document is funded by the National Science Foundation
User Manual of the Pre-built Ubuntu 12.04 Virutal Machine
SEED Labs 1 User Manual of the Pre-built Ubuntu 12.04 Virutal Machine Copyright c 2006-2014 Wenliang Du, Syracuse University. The development of this document is/was funded by three grants from the US
1. Building Testing Environment
The Practice of Web Application Penetration Testing 1. Building Testing Environment Intrusion of websites is illegal in many countries, so you cannot take other s web sites as your testing target. First,
SQL Injection January 23, 2013
Web-based Attack: SQL Injection SQL Injection January 23, 2013 Authored By: Stephanie Reetz, SOC Analyst Contents Introduction Introduction...1 Web applications are everywhere on the Internet. Almost Overview...2
Advanced Web Security, Lab
Advanced Web Security, Lab Web Server Security: Attacking and Defending November 13, 2013 Read this earlier than one day before the lab! Note that you will not have any internet access during the lab,
Advanced Web Technology 10) XSS, CSRF and SQL Injection 2
Berner Fachhochschule, Technik und Informatik Advanced Web Technology 10) XSS, CSRF and SQL Injection Dr. E. Benoist Fall Semester 2010/2011 Table of Contents Cross Site Request Forgery - CSRF Presentation
Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1
SEED Labs Local DNS Attack Lab 1 Local DNS Attack Lab Copyright c 2006 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation s Course,
Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification
Secure Web Development Teaching Modules 1 Security Testing Contents 1 Concepts... 1 1.1 Security Practices for Software Verification... 1 1.2 Software Security Testing... 2 2 Labs Objectives... 2 3 Lab
IP Phone Service Administration and Subscription
CHAPTER 6 IP Phone Service Administration and Subscription Cisco CallManager administrators maintain the list of services to which users can subscribe. These sections provide details about administering
SQL Injection. Blossom Hands-on exercises for computer forensics and security
Copyright: The development of this document is funded by Higher Education of Academy. Permission is granted to copy, distribute and /or modify this document under a license compliant with the Creative
Setup a Virtual Host/Website
Setup a Virtual Host/Website Contents Goals... 2 Setup a Website in CentOS... 2 Create the Document Root... 2 Sample Index File... 2 Configuration... 3 How to Check If Your Website is Working... 5 Setup
Livezilla How to Install on Shared Hosting http://www.jonathanmanning.com By: Jon Manning
Livezilla How to Install on Shared Hosting By: Jon Manning This is an easy to follow tutorial on how to install Livezilla 3.2.0.2 live chat program on a linux shared hosting server using cpanel, linux
Ulteo Open Virtual Desktop Installation
Ulteo Open Virtual Desktop Installation Copyright 2008 Ulteo SAS - CONTENTS CONTENTS Contents 1 Prerequisites 2 1.1 Installation of MySQL....................................... 2 2 Session Manager (sm.ulteo.com)
Tableau Server Trusted Authentication
Tableau Server Trusted Authentication When you embed Tableau Server views into webpages, everyone who visits the page must be a licensed user on Tableau Server. When users visit the page they will be prompted
SIMIAN systems. Setting up a Sitellite development environment on Mac OS X. Sitellite Content Management System
Setting up a Sitellite development environment on Mac OS X Sitellite Content Management System Introduction Mac OS X is a great platform for web application development, and now with tools like VMWare
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
Getting started with OWASP WebGoat 4.0 and SOAPUI.
Getting started with OWASP WebGoat 4.0 and SOAPUI. Hacking web services, an introduction. Version 1.0 by Philippe Bogaerts [email protected] www.radarhack.com Reviewed by Erwin Geirnaert
Web application security: Testing for vulnerabilities
Web application security: Testing for vulnerabilities Using open source tools to test your site Jeff Orloff Technology Coordinator/Consultant Sequoia Media Services Inc. Skill Level: Intermediate Date:
CPE111 COMPUTER EXPLORATION
CPE111 COMPUTER EXPLORATION BUILDING A WEB SERVER ASSIGNMENT You will create your own web application on your local web server in your newly installed Ubuntu Desktop on Oracle VM VirtualBox. This is a
Remote DNS Cache Poisoning Attack Lab
SEED Labs Remote DNS Cache Poisoning Attack Lab 1 Remote DNS Cache Poisoning Attack Lab Copyright c 2014 Wenliang Du, Syracuse University. The development of this document is/was funded by the following
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
Testing Web Applications for SQL Injection Sam Shober [email protected]
Testing Web Applications for SQL Injection Sam Shober [email protected] Abstract: This paper discusses the SQL injection vulnerability, its impact on web applications, methods for pre-deployment and
Installation documentation for Ulteo Open Virtual Desktop
Installation documentation for Ulteo Open Virtual Desktop Copyright 2008 Ulteo SAS - 1 PREREQUISITES CONTENTS Contents 1 Prerequisites 1 1.1 Installation of MySQL.......................................
Contents. 1. Infrastructure
1. Infrastructure 2. Configuration Contents a. Join the Web Server to the Domain Controller b. Install PHP, mysql, apache c. Install and configure wordpress and virtual host d. Install and configure moodle
Online Vulnerability Scanner Quick Start Guide
Online Vulnerability Scanner Quick Start Guide Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted.
Tableau Server Trusted Authentication
Tableau Server Trusted Authentication When you embed Tableau Server views into webpages, everyone who visits the page must be a licensed user on Tableau Server. When users visit the page they will be prompted
Secure Web Development Teaching Modules 1. Threat Assessment
Secure Web Development Teaching Modules 1 Threat Assessment Contents 1 Concepts... 1 1.1 Software Assurance Maturity Model... 1 1.2 Security practices for construction... 3 1.3 Web application security
SECURING APACHE : THE BASICS - III
SECURING APACHE : THE BASICS - III Securing your applications learn how break-ins occur Shown in Figure 2 is a typical client-server Web architecture, which also indicates various attack vectors, or ways
PHP Authentication Schemes
7 PHP Authentication Schemes IN THIS CHAPTER Overview Generating Passwords Authenticating User Against Text Files Authenticating Users by IP Address Authenticating Users Using HTTP Authentication Authenticating
1. What is SQL Injection?
SQL Injection 1. What is SQL Injection?...2 2. Forms of vulnerability...3 2.1. Incorrectly filtered escape characters...3 2.2. Incorrect type handling...3 2.3. Vulnerabilities inside the database server...4
Host your websites. The process to host a single website is different from having multiple sites.
The following guide will help you to setup the hosts, in case you want to run multiple websites on your VPS. This is similar to setting up a shared server that hosts multiple websites, using a single shared
Contents. Before You Install... 3. Server Installation... 5. Configuring Print Audit Secure... 10
Installation Guide Contents Before You Install... 3 Server Installation... 5 Configuring Print Audit Secure... 10 Configuring Print Audit Secure to use with Print Audit 6... 15 Licensing Print Audit Secure...
Database Security. Principle of Least Privilege. DBMS Security. IT420: Database Management and Organization. Database Security.
Database Security Rights Enforced IT420: Database Management and Organization Database Security Textbook: Ch 9, pg 309-314 PHP and MySQL: Ch 9, pg 217-227 Database security - only authorized users can
Installation Instructions
Installation Instructions 25 February 2014 SIAM AST Installation Instructions 2 Table of Contents Server Software Requirements... 3 Summary of the Installation Steps... 3 Application Access Levels... 3
Configuring Single Sign-on for WebVPN
CHAPTER 8 This chapter presents example procedures for configuring SSO for WebVPN users. It includes the following sections: Using Single Sign-on with WebVPN, page 8-1 Configuring SSO Authentication Using
Cyber Security Workshop Ethical Web Hacking
Cyber Security Workshop Ethical Web Hacking May 2015 Setting up WebGoat and Burp Suite Hacking Challenges in WebGoat Concepts in Web Technologies and Ethical Hacking 1 P a g e Downloading WebGoat and Burp
Installation and Setup Guide
Installation and Setup Guide Contents 1. Introduction... 1 2. Before You Install... 3 3. Server Installation... 6 4. Configuring Print Audit Secure... 11 5. Licensing... 16 6. Printer Manager... 17 7.
VIDEO intypedia007en LESSON 7: WEB APPLICATION SECURITY - INTRODUCTION TO SQL INJECTION TECHNIQUES. AUTHOR: Chema Alonso
VIDEO intypedia007en LESSON 7: WEB APPLICATION SECURITY - INTRODUCTION TO SQL INJECTION TECHNIQUES AUTHOR: Chema Alonso Informática 64. Microsoft MVP Enterprise Security Hello and welcome to Intypedia.
BITS-Pilani Hyderabad Campus CS C461/IS C461/CS F303/ IS F303 (Computer Networks) Laboratory 3
BITS-Pilani Hyderabad Campus CS C461/IS C461/CS F303/ IS F303 (Computer Networks) Laboratory 3 Aim: To give an introduction to HTTP, SMTP, & DNS, and observe the packets in a LAN network. HTTP (Hypertext
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
USING MYWEBSQL FIGURE 1: FIRST AUTHENTICATION LAYER (ENTER YOUR REGULAR SIMMONS USERNAME AND PASSWORD)
USING MYWEBSQL MyWebSQL is a database web administration tool that will be used during LIS 458 & CS 333. This document will provide the basic steps for you to become familiar with the application. 1. To
inforouter V8.0 Server Migration Guide.
inforouter V8.0 Server Migration Guide. 1 Copyright 1998-2015 inforouter Migration Guide I f for any reason, you wish to move the entire inforouter installation to another machine, please follow the instructions
Web Application Attacks And WAF Evasion
Web Application Attacks And WAF Evasion Ahmed ALaa (EG-CERT) 19 March 2013 What Are We Going To Talk About? - introduction to web attacks - OWASP organization - OWASP frameworks - Crawling & info. gathering
Avatier Identity Management Suite
Avatier Identity Management Suite Migrating AIMS Configuration and Audit Log Data To Microsoft SQL Server Version 9 2603 Camino Ramon Suite 110 San Ramon, CA 94583 Phone: 800-609-8610 925-217-5170 FAX:
National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide
National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide NFIRS 5.0 Software Version 5.6 1/7/2009 Department of Homeland Security Federal Emergency Management Agency United States
Authentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
MOODLE Installation on Windows Platform
Windows Installation using XAMPP XAMPP is a fully functional web server package. It is built to test web based programs on a personal computer. It is not meant for online access via the web on a production
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
INSTALLATION GUIDE VERSION
INSTALLATION GUIDE VERSION 4.1 2014 Copyright 2008 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means electronic or mechanical, for any purpose
CSCI110 Exercise 4: Database - MySQL
CSCI110 Exercise 4: Database - MySQL The exercise This exercise is to be completed in the laboratory and your completed work is to be shown to the laboratory tutor. The work should be done in week-8 but
SQL Injection Vulnerabilities in Desktop Applications
Vulnerabilities in Desktop Applications Derek Ditch (lead) Dylan McDonald Justin Miller Missouri University of Science & Technology Computer Science Department April 29, 2008 Vulnerabilities in Desktop
This installation guide will help you install your chosen IceTheme Template with the Cloner Installer package.
Introduction This installation guide will help you install your chosen IceTheme Template with the Cloner Installer package. There are 2 ways of installing the theme: 1- Using the Clone Installer Package
MassTransit 6.0 Enterprise Web Configuration for Macintosh OS 10.5 Server
MassTransit 6.0 Enterprise Web Configuration for Macintosh OS 10.5 Server November 6, 2008 Group Logic, Inc. 1100 North Glebe Road, Suite 800 Arlington, VA 22201 Phone: 703-528-1555 Fax: 703-528-3296 E-mail:
WordPress Security Scan Configuration
WordPress Security Scan Configuration To configure the - WordPress Security Scan - plugin in your WordPress driven Blog, login to WordPress as administrator, by simply entering the url_of_your_website/wp-admin
SIMIAN systems. Setting up a Sitellite development environment on Windows. Sitellite Content Management System
Setting up a Sitellite development environment on Windows Sitellite Content Management System Introduction For live deployment, it is strongly recommended that Sitellite be installed on a Unix-based operating
Understanding Sql Injection
Understanding Sql Injection Hardik Shah Understanding SQL Injection Introduction: SQL injection is a technique used by a malicious user to gain illegal access on the remote machines through the web applications
Kollaborate Server Installation Guide!! 1. Kollaborate Server! Installation Guide!
Kollaborate Server Installation Guide 1 Kollaborate Server Installation Guide Kollaborate Server is a local implementation of the Kollaborate cloud workflow system that allows you to run the service in-house
ULTEO OPEN VIRTUAL DESKTOP UBUNTU 12.04 (PRECISE PANGOLIN) SUPPORT
ULTEO OPEN VIRTUAL DESKTOP V4.0.2 UBUNTU 12.04 (PRECISE PANGOLIN) SUPPORT Contents 1 Prerequisites: Ubuntu 12.04 (Precise Pangolin) 3 1.1 System Requirements.............................. 3 1.2 sudo.........................................
Block Ads Using the hosts File
Block Ads Using the hosts File Online ads displayed in web pages are annoying. Is there a way to reduce or eliminate them at the system level instead of installing browser plugins? One effective way to
LAMP Quickstart for Red Hat Enterprise Linux 4
LAMP Quickstart for Red Hat Enterprise Linux 4 Dave Jaffe Dell Enterprise Marketing December 2005 Introduction A very common way to build web applications with a database backend is called a LAMP Stack,
SQL Injection for newbie
SQL Injection for newbie SQL injection is a security vulnerability that occurs in a database layer of an application. It is technique to inject SQL query/command as an input via web pages. Sometimes we
Tips for getting started! with! Virtual Data Center!
Tips for getting started with Virtual Data Center Last Updated: 1 July 2014 Table of Contents Safe Swiss Cloud Self Service Control Panel 2 Please note the following about for demo accounts: 2 Add an Instance
CS 161 Computer Security
Paxson Spring 2013 CS 161 Computer Security Homework 2 Due: Wednesday, March 6, at 10PM Version 1.1 (02Mar13) Instructions. This assignment must be done on your own, and in accordance with the course policies
How to Install Multicraft on a VPS or Dedicated Server (Ubuntu 13.04 64 bit)
How to Install Multicraft on a VPS or Dedicated Server (Ubuntu 13.04 64 bit) Introduction Prerequisites This tutorial will show you step-by-step on how to install Multicraft 1.8.2 on a new VPS or dedicated
Virtual Host Continue
Virtual Hosting The term virtual Host refers to the practice of running more than one web site (such as company1.example.com and company2.example.com) on a single machine. Virtual Host Continue There are
Talk Internet User Guides Controlgate Administrative User Guide
Talk Internet User Guides Controlgate Administrative User Guide Contents Contents (This Page) 2 Accessing the Controlgate Interface 3 Adding a new domain 4 Setup Website Hosting 5 Setup FTP Users 6 Setup
Tutorial: How to Use SQL Server Management Studio from Home
Tutorial: How to Use SQL Server Management Studio from Home Steps: 1. Assess the Environment 2. Set up the Environment 3. Download Microsoft SQL Server Express Edition 4. Install Microsoft SQL Server Express
SINGLE SIGN-ON FOR MTWEB
SINGLE SIGN-ON FOR MTWEB FOR MASSTRANSIT ENTERPRISE WINDOWS SERVERS WITH DIRECTORY SERVICES INTEGRATION Group Logic, Inc. November 26, 2008 Version 1.1 CONTENTS Revision History...3 Feature Highlights...4
Advanced PostgreSQL SQL Injection and Filter Bypass Techniques
Advanced PostgreSQL SQL Injection and Filter Bypass Techniques INFIGO-TD TD-200 2009-04 2009-06 06-17 Leon Juranić [email protected] INFIGO IS. All rights reserved. This document contains information
Use Enterprise SSO as the Credential Server for Protected Sites
Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured
Secure Messaging Server Console... 2
Secure Messaging Server Console... 2 Upgrading your PEN Server Console:... 2 Server Console Installation Guide... 2 Prerequisites:... 2 General preparation:... 2 Installing the Server Console... 2 Activating
EQUELLA. Clustering Configuration Guide. Version 6.0
EQUELLA Clustering Configuration Guide Version 6.0 Document History Document No. Reviewed Finalised Published 1 17/10/2012 17/10/2012 17/10/2012 October 2012 edition. Information in this document may change
Asia Web Services Ltd. (vpshosting.com.hk)
. (vpshosting.com.hk) Getting Started guide for VPS Published: July 2011 Copyright 2011 Table of Contents Page I. Introduction to VPS 3 II. Accessing Plesk control panel 4 III. Adding your domain in Plesk
CS 361S - Network Security and Privacy Fall 2015. Project #1
CS 361S - Network Security and Privacy Fall 2015 Project #1 Due: 12:30pm CST, October 8, 2015 Submission instructions Follow the instructions in the project description. If you are submitting late, please
Railo Installation on CentOS Linux 6 Best Practices
Railo Installation on CentOS Linux 6 Best Practices Purpose: This document is intended for system administrators who want to deploy their Mura CMS, Railo, Tomcat, and JRE stack in a secure but easy to
JAMF Software Server Installation Guide for Linux. Version 8.6
JAMF Software Server Installation Guide for Linux Version 8.6 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate.
Web Application Security
Web Application Security John Zaharopoulos ITS - Security 10/9/2012 1 Web App Security Trends Web 2.0 Dynamic Webpages Growth of Ajax / Client side Javascript Hardening of OSes Secure by default Auto-patching
SQL Injection. The ability to inject SQL commands into the database engine through an existing application
SQL Injection The ability to inject SQL commands into the database engine through an existing application 1 What is SQL? SQL stands for Structured Query Language Allows us to access a database ANSI and
Installation Tutorial Script: The Real Estate Script. 1. Please login to download script. On PHP Classifieds Script web site.
Installation Tutorial Script: The Real Estate Script Thank you for your purchase of The Real Estate Script. This tutorial will guide you threw the installation process. In this install example we use CPanel
Serious Threat. Targets for Attack. Characterization of Attack. SQL Injection 4/9/2010 COMP620 1. On August 17, 2009, the United States Justice
Serious Threat SQL Injection COMP620 On August 17, 2009, the United States Justice Department tcharged an American citizen Albert Gonzalez and two unnamed Russians with the theft of 130 million credit
Interactive Reporting Emailer Manual
Brief Overview of the IR Emailer The Interactive Reporting Emailer allows a user to schedule their favorites to be emailed to them on a regular basis. It accomplishes this by running once per day and sending
Install Apache on windows 8 Create your own server
Source: http://www.techscio.com/install-apache-on-windows-8/ Install Apache on windows 8 Create your own server Step 1: Downloading Apache Go to Apache download page and download the latest stable version
SQL INJECTION ATTACKS By Zelinski Radu, Technical University of Moldova
SQL INJECTION ATTACKS By Zelinski Radu, Technical University of Moldova Where someone is building a Web application, often he need to use databases to store information, or to manage user accounts. And
Installation of PHP, MariaDB, and Apache
Installation of PHP, MariaDB, and Apache A few years ago, one would have had to walk over to the closest pizza store to order a pizza, go over to the bank to transfer money from one account to another
Virtual Host (Web Server)
Virtual Host (Web Server) 1 Muhammad Zen Samsono Hadi, ST. MSc. Lab. Komunikasi Digital Gedung D4 Lt. 1 EEPIS-ITS Virtual Networking implementation 2 Power consumption comparison 3 VS 5 Physical Virtual
CSIS 3230 Computer Networking Principles, Spring 2012 Lab 7 Domain Name System (DNS)
CSIS 3230 Computer Networking Principles, Spring 2012 Lab 7 Domain Name System (DNS) By Michael Olan, Richard Stockton College (last update: March 2012) Purpose At this point, all hosts should be communicating
SQL Injection. By Artem Kazanstev, ITSO and Alex Beutel, Student
SQL Injection By Artem Kazanstev, ITSO and Alex Beutel, Student SANS Priority No 2 As of September 2009, Web application vulnerabilities such as SQL injection and Cross-Site Scripting flaws in open-source
T320 E-business technologies: foundations and practice
T320 E-business technologies: foundations and practice Block 3 Part 2 Activity 2: Generating a client from WSDL Prepared for the course team by Neil Simpkins Introduction 1 WSDL for client access 2 Static
Active Directory Authentication Integration
Active Directory Authentication Integration This document provides a detailed explanation of how to integrate Active Directory into the ipconfigure Installation of a Windows 2003 Server for network security.
Web Application Report
Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012
How to install phpbb forum on NTU student club web server
How to install phpbb forum on NTU student club web server This guide contains the step by step instructions to install phpbb (stable release 3.0.7- PL1) on NTU student club web server. It does not cover
Creating an ESS instance on the Amazon Cloud
Creating an ESS instance on the Amazon Cloud Copyright 2014-2015, R. James Holton, All rights reserved (11/13/2015) Introduction The purpose of this guide is to provide guidance on creating an Expense
Apache Server Implementation Guide
Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042
Web attacks and security: SQL injection and cross-site scripting (XSS)
Web attacks and security: SQL injection and cross-site scripting (XSS) License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike
MySQL Quick Start Guide
Fasthosts Customer Support MySQL Quick Start Guide This guide will help you: Add a MySQL database to your account. Find your database. Add additional users. Use the MySQL command-line tools through ssh.
