This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Category:OWASP SQLiX Project"
From OWASP
(→Output example) |
m (Added a date to be more clear.) |
||
(35 intermediate revisions by 14 users not shown) | |||
Line 1: | Line 1: | ||
− | = | + | =Main= |
− | + | <!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --> | |
+ | <div style="width:100%;height:100px;border:0,margin:0;overflow: hidden;">[[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] </div> | ||
− | == | + | {| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- |
− | '''SQLiX''' is a '''SQL Injection scanner''' which attempts to fill the gap between what commercial software available on the market can do and what can really be done to detect and identify SQL injection. | + | | valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | |
+ | '''NOTE:''' | ||
+ | |||
+ | The project is currently under the process of porting from Perl to Python. The next version will be released soon!<br />-- AnirudhAnand, 16 March 2014 | ||
+ | |||
+ | ==Introduction== | ||
+ | |||
+ | SQLiX is a [[SQL Injection]] scanner coded in Perl. It is able to crawl, detect SQL injection vectors, identify the back-end database, and grab function call/UDF results (even execute system commands for MS-SQL). The concepts in use are different than the one used in other SQL injection scanners. SQLiX is able to find normal and blind SQL injection vectors and doesn't need to reverse engineer the original SQL request (using only function calls). | ||
+ | |||
+ | If you are a developer interested in remediating or avoiding the kinds of SQL injection vulnerabilities this tool can find, check out the OWASP [[SQL Injection Prevention Cheat Sheet]]. | ||
+ | |||
+ | ==Description== | ||
+ | |||
+ | '''SQLiX''' is a '''[[SQL Injection]] scanner''' which attempts to fill the gap between what commercial software available on the market can do and what can really be done to detect and identify SQL injection. | ||
Current injection methods used by commercial web assessment software are based on error generation or statement injections. | Current injection methods used by commercial web assessment software are based on error generation or statement injections. | ||
Line 17: | Line 31: | ||
'''statement injection:''' | '''statement injection:''' | ||
− | The second method used is statement injection. | + | The second method used is statement injection. Let's look at an example: |
− | Let's look at an example: | ||
The target URL | The target URL | ||
Line 40: | Line 53: | ||
− | -- | + | ==Licensing== |
+ | OWASP SQLiX is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one. | ||
− | + | | valign="top" style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" | | |
+ | |||
+ | == What is SQLiX? == | ||
+ | |||
+ | OWASP SQLiX provides: | ||
* SQLiX uses multiple techniques to determine if the current server-side script is vulnerable to SQL Injection | * SQLiX uses multiple techniques to determine if the current server-side script is vulnerable to SQL Injection | ||
Line 54: | Line 72: | ||
* SQLiX contains an exploit module to demonstrate how a hacker could exploit the found SQL injection to gather sensitive information | * SQLiX contains an exploit module to demonstrate how a hacker could exploit the found SQL injection to gather sensitive information | ||
− | |||
− | + | == Presentation == | |
− | + | Link to presentation | |
− | |||
− | == Command line usage | + | |
+ | == Project Leader == | ||
+ | |||
+ | Anirudh | ||
+ | |||
+ | |||
+ | |||
+ | == Related Projects == | ||
+ | |||
+ | |||
+ | |||
+ | | valign="top" style="padding-left:25px;width:200px;" | | ||
+ | |||
+ | == Quick Download == | ||
+ | |||
+ | OWASP SQLiX v1.0 is available for download [http://cedri.cc/tools/SQLiX_v1.0.tar.gz '''here'''] or [http://www.mediafire.com/?5lbt0tb1jee '''here''']. | ||
+ | |||
+ | |||
+ | == News and Events == | ||
+ | * [20 Nov 2013] News 2 | ||
+ | * [30 Sep 2013] News 1 | ||
+ | |||
+ | |||
+ | == In Print == | ||
+ | |||
+ | |||
+ | |||
+ | ==Classifications== | ||
+ | |||
+ | {| width="200" cellpadding="2" | ||
+ | |- | ||
+ | | align="center" valign="top" width="50%" rowspan="2"| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]] | ||
+ | | align="center" valign="top" width="50%"| [[File:Owasp-builders-small.png|link=]] | ||
+ | |- | ||
+ | | align="center" valign="top" width="50%"| [[File:Owasp-defenders-small.png|link=]] | ||
+ | |- | ||
+ | | colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] | ||
+ | |- | ||
+ | | colspan="2" align="center" | [[File:Project_Type_Files_CODE.jpg|link=]] | ||
+ | |} | ||
+ | |||
+ | |} | ||
+ | |||
+ | =Requirements= | ||
+ | Perl with the following dependencies: | ||
+ | |||
+ | WWW::CheckSite | ||
+ | |||
+ | Tie::CharArray | ||
+ | |||
+ | perl -MCPAN -e 'install WWW::CheckSite' | ||
+ | perl -MCPAN -e 'install Tie::CharArray' | ||
+ | |||
+ | = Command line usage = | ||
'''Usage: SQLiX.pl [options]''' | '''Usage: SQLiX.pl [options]''' | ||
Line 115: | Line 184: | ||
v=5 => debug view [all url,content and headers are displayed] | v=5 => debug view [all url,content and headers are displayed] | ||
− | + | ||
+ | = Output example = | ||
*'''MS-SQL System command execution''' | *'''MS-SQL System command execution''' | ||
Line 183: | Line 253: | ||
Analysing URI obtained by flat file [crawling] | Analysing URI obtained by flat file [crawling] | ||
http://www.target.example.com/MySQL-DocumentDescriptionMagicQuote.asp?DocID=2 | http://www.target.example.com/MySQL-DocumentDescriptionMagicQuote.asp?DocID=2 | ||
− | + | [+] working on DocID | |
− | + | [+] Method: MS-SQL error message | |
− | + | [+] Method: SQL error message | |
− | + | [FOUND] Match found INPUT:[user] - "Microsoft OLE DB Provider for ODBC Drivers" | |
− | + | [INFO] Error without quote | |
− | + | [INFO] Database identified: MySQL Server | |
− | + | [INFO] Current function: version() | |
− | + | [INFO] length: 19 | |
− | + | 4.1.20-community-nt | |
− | + | [FOUND] SQL error message | |
http://www.target.example.com/PGSQL-DocumentDescription.asp?DocID=2 | http://www.target.example.com/PGSQL-DocumentDescription.asp?DocID=2 | ||
− | + | [+] working on DocID | |
− | + | [+] Method: MS-SQL error message | |
− | + | [+] Method: SQL error message | |
− | + | [FOUND] Match found INPUT:['] - "Microsoft OLE DB Provider for ODBC Drivers" | |
− | + | [INFO] Error without quote | |
− | + | [INFO] Database identified: PostgreSQL Server | |
− | + | [INFO] Current function: version() | |
− | + | [INFO] length: 88 | |
− | + | PostgreSQL 8.0.7 on i686-pc-mingw32, compiled by GCC gcc.exe (GCC) 3.4.2 | |
− | + | [FOUND] SQL error message | |
RESULTS: | RESULTS: | ||
− | The variable [DocID] from [ http://www.target.example.com/MySQL-DocumentDescriptionMagicQuote.asp?DocID=2 ] ... | + | The variable [DocID] from |
+ | [ http://www.target.example.com/MySQL-DocumentDescriptionMagicQuote.asp?DocID=2 ] ... | ||
... is vulnerable to SQL Injection [Error message (user) - MySQL]. | ... is vulnerable to SQL Injection [Error message (user) - MySQL]. | ||
− | The variable [DocID] from [ http://www.target.example.com/PGSQL-DocumentDescription.asp?DocID=2 ] ... | + | The variable [DocID] from |
+ | [ http://www.target.example.com/PGSQL-DocumentDescription.asp?DocID=2 ] ... | ||
... is vulnerable to SQL Injection [Error message (') - PostgreSQL]. | ... is vulnerable to SQL Injection [Error message (') - PostgreSQL]. | ||
− | |||
− | |||
− | |||
− | == | + | = Acknowledgements = |
+ | ==Volunteers== | ||
− | |||
− | + | = Road Map and Getting Involved = | |
+ | As of XXX, the priorities are: | ||
+ | * xxx | ||
+ | * xxx | ||
+ | * xxx | ||
− | + | We hope you find the OWASP SQLiX Project useful. Please contribute to the Project by volunteering for one of the Tasks, sending your comments, questions, and suggestions to owasp@owasp.org. To join the OWASP SQLiX Project mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-sqlix subscription page.] | |
− | |||
− | |||
− | |||
− | |||
− | + | =Project About= | |
+ | ==== Project Identification ==== | ||
+ | {{:GPC_Project_Details/OWASP_SQLiX_Project | OWASP Project Identification Tab}}}} | ||
− | + | __NOTOC__ <headertabs /> | |
− | |||
− | [[Category:OWASP SQLiX | + | [[Category:OWASP Project|SQLiX Project]] |
− | |||
[[Category:OWASP Download]] | [[Category:OWASP Download]] | ||
[[Category:OWASP Tool]] | [[Category:OWASP Tool]] | ||
− | |||
− | |||
[[Category:SQL]] | [[Category:SQL]] | ||
+ | [[Category:OWASP Oracle Project]] |
Latest revision as of 18:51, 25 May 2017
Subcategories
This category has only the following subcategory.