This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Category:OWASP SQLiX Project"
From OWASP
AnirudhAnand (talk | contribs) |
m (Added a date to be more clear.) |
||
Line 6: | Line 6: | ||
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | {| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | ||
| valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | | valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | ||
− | '''NOTE: | + | '''NOTE:''' |
− | ''' | ||
− | The | + | The project is currently under the process of porting from Perl to Python. The next version will be released soon!<br />-- AnirudhAnand, 16 March 2014 |
− | |||
− | |||
− | |||
− | |||
==Introduction== | ==Introduction== | ||
− | SQLiX | + | SQLiX is a [[SQL Injection]] scanner coded in Perl. It is able to crawl, detect SQL injection vectors, identify the back-end database, and grab function call/UDF results (even execute system commands for MS-SQL). The concepts in use are different than the one used in other SQL injection scanners. SQLiX is able to find normal and blind SQL injection vectors and doesn't need to reverse engineer the original SQL request (using only function calls). |
− | |||
− | |||
− | |||
+ | If you are a developer interested in remediating or avoiding the kinds of SQL injection vulnerabilities this tool can find, check out the OWASP [[SQL Injection Prevention Cheat Sheet]]. | ||
==Description== | ==Description== | ||
Line 38: | Line 31: | ||
'''statement injection:''' | '''statement injection:''' | ||
− | The second method used is statement injection. | + | The second method used is statement injection. Let's look at an example: |
− | Let's look at an example: | ||
The target URL | The target URL |
Latest revision as of 18:51, 25 May 2017
Subcategories
This category has only the following subcategory.