0% found this document useful (0 votes)
25 views27 pages

(Ebook) The Database Hackers Handbook by David Litchfield, Chris Anley, John Heasman, Bill Grindlay, ISBN 9780764578014, 0764578014 PDF Download

Study material: (Ebook) The Database Hackers Handbook by David Litchfield, Chris Anley, John Heasman, Bill Grindlay, ISBN 9780764578014, 0764578014 Download instantly. A complete academic reference filled with analytical insights and well-structured content for educational enrichment.

Uploaded by

jlzkeqkzmx377
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views27 pages

(Ebook) The Database Hackers Handbook by David Litchfield, Chris Anley, John Heasman, Bill Grindlay, ISBN 9780764578014, 0764578014 PDF Download

Study material: (Ebook) The Database Hackers Handbook by David Litchfield, Chris Anley, John Heasman, Bill Grindlay, ISBN 9780764578014, 0764578014 Download instantly. A complete academic reference filled with analytical insights and well-structured content for educational enrichment.

Uploaded by

jlzkeqkzmx377
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

(Ebook) The Database Hackers Handbook by David

Litchfield, Chris Anley, John Heasman, Bill Grindlay,


ISBN 9780764578014, 0764578014 Pdf Download

https://ebooknice.com/product/the-database-hackers-handbook-5502716

★★★★★
4.8 out of 5.0 (14 reviews )

DOWNLOAD PDF

ebooknice.com
(Ebook) The Database Hackers Handbook by David Litchfield,
Chris Anley, John Heasman, Bill Grindlay, ISBN
9780764578014, 0764578014 Pdf Download

EBOOK

Available Formats

■ PDF eBook Study Guide Ebook

EXCLUSIVE 2025 EDUCATIONAL COLLECTION - LIMITED TIME

INSTANT DOWNLOAD VIEW LIBRARY


Here are some recommended products that we believe you will be
interested in. You can click the link to download.

(Ebook) Biota Grow 2C gather 2C cook by Loucas, Jason; Viles, James


ISBN 9781459699816, 9781743365571, 9781925268492, 1459699815,
1743365578, 1925268497

https://ebooknice.com/product/biota-grow-2c-gather-2c-cook-6661374

(Ebook) Matematik 5000+ Kurs 2c Lärobok by Lena Alfredsson, Hans


Heikne, Sanna Bodemyr ISBN 9789127456600, 9127456609

https://ebooknice.com/product/matematik-5000-kurs-2c-larobok-23848312

(Ebook) SAT II Success MATH 1C and 2C 2002 (Peterson's SAT II Success)


by Peterson's ISBN 9780768906677, 0768906679

https://ebooknice.com/product/sat-ii-success-
math-1c-and-2c-2002-peterson-s-sat-ii-success-1722018

(Ebook) Master SAT II Math 1c and 2c 4th ed (Arco Master the SAT
Subject Test: Math Levels 1 & 2) by Arco ISBN 9780768923049,
0768923042

https://ebooknice.com/product/master-sat-ii-math-1c-and-2c-4th-ed-
arco-master-the-sat-subject-test-math-levels-1-2-2326094
(Ebook) Cambridge IGCSE and O Level History Workbook 2C - Depth Study:
the United States, 1919-41 2nd Edition by Benjamin Harrison ISBN
9781398375147, 9781398375048, 1398375144, 1398375047

https://ebooknice.com/product/cambridge-igcse-and-o-level-history-
workbook-2c-depth-study-the-united-states-1919-41-2nd-edition-53538044

(Ebook) The shellcoder's handbook discovering and exploiting security


holes. - Cover title. - Includes index by Anley, Chris ISBN
9780470080238, 047008023X

https://ebooknice.com/product/the-shellcoder-s-handbook-discovering-
and-exploiting-security-holes-cover-title-includes-index-11336882

(Ebook) Servers for Hackers: Server Administration for Programmers by


Chris Fidao

https://ebooknice.com/product/servers-for-hackers-server-
administration-for-programmers-22446142

(Ebook) Servers for Hackers: Server Administration for Programmers by


Chris Fidao

https://ebooknice.com/product/servers-for-hackers-server-
administration-for-programmers-22506570

(Ebook) SQL Antipatterns: Avoiding the Pitfalls of Database


Programming by Bill Karwin ISBN 9781934356555, 1934356557

https://ebooknice.com/product/sql-antipatterns-avoiding-the-pitfalls-
of-database-programming-1316398
01_578014 ffirs.qxd 6/3/05 6:58 PM Page i

The Database Hacker’s


Handbook: Defending
Database Servers
01_578014 ffirs.qxd 6/3/05 6:58 PM Page ii
01_578014 ffirs.qxd 6/3/05 6:59 PM Page iii

The Database Hacker’s


Handbook: Defending
Database Servers

David Litchfield, Chris Anley,


John Heasman, and
Bill Grindlay
01_578014 ffirs.qxd 6/3/05 6:59 PM Page iv

The Database Hacker’s Handbook: Defending Database Servers


Published by
Wiley Publishing, Inc.
10475 Crosspoint Boulevard
Indianapolis, IN 46256
www.wiley.com
Copyright © 2005 by Wiley Publishing, Inc., Indianapolis, Indiana
Published simultaneously in Canada
ISBN 13: 978-0-7645-7801-4
ISBN 10: 0-7645-7801-4
Manufactured in the United States of America
10 9 8 7 6 5 4 3 2 1
1O/SS/QW/QV/IN
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form
or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as
permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior
written permission of the Publisher, or authorization through payment of the appropriate per-copy fee
to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978)
646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley
Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355,
e-mail: http://www.wiley.com/go/permissions.
Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or
warranties with respect to the accuracy or completeness of the contents of this work and specifically
disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No
warranty may be created or extended by sales or promotional materials. The advice and strategies con-
tained herein may not be suitable for every situation. This work is sold with the understanding that the
publisher is not engaged in rendering legal, accounting, or other professional services. If professional
assistance is required, the services of a competent professional person should be sought. Neither the
publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or
Website is referred to in this work as a citation and/or a potential source of further information does
not mean that the author or the publisher endorses the information the organization or Website may
provide or recommendations it may make. Further, readers should be aware that Internet Websites
listed in this work may have changed or disappeared between when this work was written and when
it is read.
For general information on our other products and services or to obtain technical support, please con-
tact our Customer Care Department within the U.S. at (800) 762-2974, outside the U.S. at (317) 572-3993
or fax (317) 572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may
not be available in electronic books.
Library of Congress Cataloging-in-Publication Data:
The Database hacker's handbook : defending database servers / David Litchfield ... [et al.].
p. cm.
Includes index.
ISBN 0-7645-7801-4 (paper/website)
1. Computer networks—Security measures. 2. Computer security. I. Litchfield, David (David
William)
TK5105.59.D3 2005
005.8—dc22
2005008241
Trademarks: Wiley, the Wiley logo, and related trade dress are registered trademarks of John Wiley &
Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without
written permission. All other trademarks are the property of their respective owners. Wiley Publishing,
Inc., is not associated with any product or vendor mentioned in this book.
01_578014 ffirs.qxd 6/3/05 6:59 PM Page v

To my wife and best friend, Sophie.

–David Litchfield

To my wife Victoria, who is gorgeous, loving, and smart, and who


deserves the very best but for some unaccountable reason chose me.

–Chris Anley

To my family and friends, for their support.

–John Heasman

To my family and friends, with thanks for their support and


encouragement.

–Bill Grindlay
01_578014 ffirs.qxd 6/3/05 6:59 PM Page vi
01_578014 ffirs.qxd 6/3/05 6:59 PM Page vii

About the Authors

David Litchfield specializes in searching for new threats to database systems


and web applications and holds the unofficial world record for finding major
security flaws. He has lectured to both British and U.S. government security
agencies on database security and is a regular speaker at the Blackhat Security
Briefings. He is a co-author of The Shellcoder’s Handbook, SQL Server Security,
and Special Ops. In his spare time he is the Managing Director of Next Genera-
tion Security Software Ltd.
Chris Anley is a co-author of The Shellcoder’s Handbook, a best-selling book
about security vulnerability research. He has published whitepapers and secu-
rity advisories on a number of database systems, including SQL Server,
Sybase, MySQL, DB2, and Oracle.
John Heasman is a principal security consultant at NGS Software. He is a pro-
lific security researcher and has published many security advisories relating to
high-profile products such as Microsoft Windows, Real Player, Apple Quick-
Time, and PostgreSQL.
Bill Grindlay is a senior security consultant and software engineer at NGS
Software. He has worked on both the generalized vulnerability scanner
Typhon III and the NGSSQuirreL family of database security scanners. He is a
co-author of the database administrator’s guide, SQL Server Security.
Next Generation Security Software Ltd is a UK-based company that develops
a suite of database server vulnerability assessment tools, the NGSSQuirreL
family. Founded in 2001, NGS Software’s consulting arm is the largest dedi-
cated security team in Europe. All four authors of this book work for NGS
Software.

vii
01_578014 ffirs.qxd 6/3/05 6:59 PM Page viii
01_578014 ffirs.qxd 6/3/05 6:59 PM Page ix

Credits

Acquisitions Editor Vice President and Publisher


Carol Long Joseph B. Wikert
Development Editor Project Coordinator
Kenyon Brown Erin Smith
Production Editor Graphics and Production
Angela Smith Specialists
Kelly Emkow, Denny Hager,
Copy Editor
Stephanie D. Jumper,
Kim Cofer
Lynsey Osborn,
Editorial Manager Melanee Prendergast
Mary Beth Wakefield
Quality Control Technician
Vice President & Executive Group Susan Moritz
Publisher
Proofreading and Indexing
Richard Swadley
TECHBOOKS Production Services

ix
01_578014 ffirs.qxd 6/3/05 6:59 PM Page x
02_578014 ftoc.qxd 6/3/05 6:51 PM Page xi

Contents

About the Authors vii


Preface xxi
Acknowledgments xxv
Introduction xxvii
Part I Introduction 1
Chapter 1 Why Care About Database Security? 3
Which Database Is the Most Secure? 4
The State of Database Security Research 5
Classes of Database Security Flaws 5
Unauthenticated Flaws in Network Protocols 6
Authenticated Flaws in Network Protocols 7
Flaws in Authentication Protocols 8
Unauthenticated Access to Functionality 9
Arbitrary Code Execution in Intrinsic SQL Elements 9
Arbitrary Code Execution in Securable SQL Elements 10
Privilege Elevation via SQL Injection 11
Local Privilege Elevation Issues 12
So What Does It All Mean? 13
Finding Flaws in Your Database Server 13
Don’t Believe the Documentation 14
Implement Your Own Client 14
Debug the System to Understand How It Works 14
Identify Communication Protocols 15
Understand Arbitrary Code Execution Bugs 15
Write Your Own “Fuzzers” 15
Conclusion 16

xi
02_578014 ftoc.qxd 6/3/05 6:51 PM Page xii

xii Contents

Part II Oracle 17
Chapter 2 The Oracle Architecture 19
Examining the Oracle Architecture 20
Oracle Processes and Oracle on the Network 20
The Oracle TNS Listener 20
The Oracle RDBMS 25
The Oracle Intelligent Agent 27
Oracle Authentication and Authorization 32
Database Authentication 34
Authorization 35
Key System Privileges 35
EXECUTE ANY PROCEDURE 36
SELECT ANY DICTIONARY 36
GRANT ANY PRIVILEGE / ROLE / OBJECT PRIVILEGE 36
CREATE LIBRARY 36
Oracle Auditing 36
Chapter 3 Attacking Oracle 39
Scanning for Oracle Servers 39
Common Ports 39
The TNS Listener 40
Oracle’s PL/SQL 49
PL/SQL Injection 53
Injecting into SELECT Statements 54
A Simple Example 54
Injecting Attacker-Defined Functions to Overcome Barriers 55
Doing More Than Just SELECT 59
Injecting into DELETE, INSERT, and UPDATE Statements 60
Injecting into INSERT Statements 60
Real-World Examples 61
Injecting into Anonymous PL/SQL Blocks 62
Real-World Examples 63
Executing User-Supplied Queries with DBMS_SQL 65
Real-World Examples 68
PL/SQL Injection and Database Triggers 68
PL/SQL and Oracle Application Server 71
Summary 74
Chapter 4 Oracle: Moving Further into the Network 75
Running Operating System Commands 75
Running OS Commands with PL/SQL 76
Running OS Commands with DBMS_SCHEDULER 78
Running OS Commands with Java 78
Accessing the File System 79
Java and the File System 80
Accessing the Network 81
Database Links 81
02_578014 ftoc.qxd 6/3/05 6:51 PM Page xiii

Contents xiii

PL/SQL and the Network 82


UTL_TCP 82
UTL_HTTP 84
UTL_SMTP 85
Summary 85
Chapter 5 Securing Oracle 87
Oracle Security Recommendations 87
Oracle TNS Listener 87
Set a TNS Listener Password 87
Turn on Admin Restrictions 88
Turn on TCP Valid Node Checking 88
Turn off XML Database 89
Turn off External Procedures 89
Encrypt Network Traffic 89
Oracle Database Server 89
Accounts 89
Lock and Expire Unused Accounts 90
New Account Creation 90
Passwords 90
Roles 91
New Role Creation 91
Roles for User Accounts 91
DBA Role 93
Auditing 93
PL/SQL Packages, Procedures, and Functions 93
Triggers 94
Patching 94
Security Audits 94
New Database Installs 95
New Database Creation 95
Part III DB2 97
Chapter 6 IBM DB2 Universal Database 99
Introduction 99
DB2 Deployment Scenarios 100
DB2 on the Network 100
Header 104
Commands 104
Datatypes 104
DB2 Processes 106
DB2 Physical Database Layout 108
DB2 on Windows 108
DB2 on Linux 109
DB2 Logical Database Layout 109
DB2 Authentication and Authorization 109
02_578014 ftoc.qxd 6/3/05 6:51 PM Page xiv

xiv Contents

Authorization 120
The DBAUTH View 120
The TABAUTH View 121
The ROUTINEAUTH View 122
Summary 123
Chapter 7 DB2: Discovery, Attack, and Defense 125
Finding DB2 on the Network 125
Chapter 8 Attacking DB2 135
Buffer Overflows in DB2 Procedures and Functions 135
Other Overflows in DB2 136
DB2 Set Locale LCTYPE Overflow 138
DB2 JDBC Applet Server Buffer Overflow 138
DB2 Remote Command Server 139
Running Commands Through DB2 141
Gaining Access to the Filesystem Through DB2 142
The Load Method 142
XML Functions 143
Local Attacks Against DB2 143
Summary 152
Chapter 9 Securing DB2 153
Securing the Operating System 153
Securing the DB2 Network Interface 154
Securing the DBMS 154
Remove Unnecessary Components 155
And Finally . . . 155
Part IV Informix 157
Chapter 10 The Informix Architecture 159
Examining the Informix Architecture 159
Informix on the Network 159
Connecting to a Remote Informix Server 160
The Informix Logical Layout 160
Understanding Authentication and Authorization 163
Connect 163
Resource 163
DBA 163
Object Privileges 164
Privileges and Creating Procedures 164
Chapter 11 Informix: Discovery, Attack, and Defense 165
Attacking and Defending Informix 165
Post-Authentication Attacks 176
Shared Memory, Usernames, and Passwords 178
02_578014 ftoc.qxd 6/3/05 6:51 PM Page xv

Contents xv

Attacking Informix with Stored Procedural Language (SPL) 180


Running Arbitrary Commands with SPL 181
Loading Arbitrary Libraries 185
Reading and Writing Arbitrary Files on the Server 185
SQL Buffer Overflows in Informix 185
Local Attacks Against Informix Running on Unix Platforms 186
Summary 188
Chapter 12 Securing Informix 189
Keep the Server Patched 189
Encrypt Network Traffic 189
Revoke the Connect Privilege from Public 190
Enable Auditing 190
Revoke Public Permissions on File Access Routines 190
Revoke Public Execute Permissions on Module Routines 190
Preventing Shared Memory from Being Dumped 190
Preventing Local Attacks on Unix-Based Servers 191
Restrict Language Usage 191
Useful Documents 191
Part V Sybase ASE 193
Chapter 13 Sybase Architecture 195
Sybase Background 195
History 196
Stand-Out Features 196
Java-In-ASE 196
XML Support (Native and via Java) 197
Cross-Platform Support 198
Wider “Device” Support (for Raw Disk Partitions) 198
Support for Open Authentication Protocols 198
Deployment Scenarios 199
Client/Server 199
Web Applications 200
Development Environments 201
Firewall Implications for Sybase 202
Communicating with Sybase 203
Privilege Model 203
Login Account Basics 204
Passwords and Password Complexity 204
Roles 205
Sybase File Layout 205
Service Interaction 206
Extended Stored Procedures 206
Starting New Listeners 207
02_578014 ftoc.qxd 6/3/05 6:51 PM Page xvi

xvi Contents

Chapter 14 Sybase: Discovery, Attack, and Defense 209


Finding Targets 209
Scanning for Sybase 209
Sybase Version Numbers 210
Snooping Authentication 211
Attacking Sybase 211
SQL Injection in Sybase 211
SQL Injection Basics 212
MS SQL Server Injection Techniques in Sybase 215
Comments 216
Union Select 216
Error Messages 216
@@version 217
Having/Group By 218
SQL Batch Injection 218
xp_cmdshell 218
xp_regread 219
Custom Extended Stored Procedures 219
CHAR Function to Bypass Quote Filters 219
SHUTDOWN 220
Audit Evasion via sp_password 220
Linked Servers 220
Using Time Delays as a Communications Channel 221
VARBINARY Literal Encoding and Exec 223
External Filesystem Access 224
Defending Against Attacks 226
Older Known Sybase ASE Security Bugs 226
CAN-2003-0327 — Remote Password Array Overflow 227
DBCC CHECKVERIFY Buffer Overflow 227
DROP DATABASE Buffer Overflow Vulnerability 227
xp_freedll Buffer Overflow 227
Sybase Version Tool 228
Chapter 15 Sybase: Moving Further into the Network 235
Accessing the Network 235
Connecting to Other Servers with Sybase 236
Java in SQL 237
JSQL TDS Client 239
JSQL TCP Proxy 241
Trojanning Sybase 243
Grant a User sa or sso_role 243
Allow Direct Updates to System Tables, Grant Access
to Selected System Tables 243
Chapter 16 Securing Sybase 245
Sybase Security Checklist 245
Background 245
Operating System 245
02_578014 ftoc.qxd 6/3/05 6:51 PM Page xvii

Contents xvii

Sybase Users 246


Sybase Configuration 246
Background 246
Operating System 247
Sybase Users 248
Sybase Configuration 250
Part VI MySQL 253
Chapter 17 MySQL Architecture 255
Examining the Physical Database Architecture 255
Deployment 256
WinMySQLAdmin Autostart 257
Default Usernames and Passwords 258
Protocol 259
Bugs in the Authentication Protocol 260
Basic Cryptographic Weakness in the Authentication
Protocol Prior to 4.1 260
Authentication Algorithm Prior to 3.23.11 260
CHANGE_USER Prior to 3.23.54 261
Authentication Algorithm in 4.1.1, 4.1.2, and 5.0.0 261
Examining the Logical Database Architecture 263
MySQL Logical Database Architecture 263
Storage Engines 264
Filesystem Layout 265
Query Batching 265
Examining Users and Groups 266
Exploiting Architectural Design Flaws 272
User-Defined Functions 273
Flaws in the Access Control System 276
Missing Features with Security Impact 276
Missing Features That Improve Security 278
Chapter 18 MySQL: Discovery, Attack, and Defense 279
Finding Targets 279
Scanning for MySQL 279
MySQL Version Numbers 280
Snooping Authentication 280
Hacking MySQL 281
SQL Injection in MySQL 282
UNION SELECT 284
LOAD_FILE Function 285
LOAD DATA INFILE Statement 287
SELECT . . . INTO OUTFILE 287
Time Delays and the BENCHMARK Function 288
Known MySQL Bugs 289
Trojanning MySQL 297
Adding a User 298
Modification of an Existing User’s Privileges 300
02_578014 ftoc.qxd 6/3/05 6:51 PM Page xviii

xviii Contents

Cracking Password Hashes 300


The MySQL One-Bit Patch 302
Dangerous Extensions: MyLUA and MyPHP 303
Local Attacks Against MySQL 304
Race Conditions 304
Overflows 304
The MySQL File Structure Revisited 305
Chapter 19 MySQL: Moving Further into the Network 307
MySQL Client Hash Authentication Patch 307
Running External Programs: User-Defined Functions 309
User-Defined Functions in Windows 311
Summary 315
Chapter 20 Securing MySQL 317
MySQL Security Checklist 317
Background 317
Operating System 318
MySQL Users 318
MySQL Configuration 319
Routine Audit 319
Background 319
Operating System 320
MySQL Users 322
MySQL Configuration 324
Routine Audit 326
Part VII SQL Server 329
Chapter 21 Microsoft SQL Server Architecture 331
SQL Server Background 331
SQL Server Versions 332
Physical Architecture 333
Tabular Data Stream (TDS) Protocol 333
Network Libraries 334
SQL Server Processes and Ports 334
Authentication and Authorization 336
OPENROWSET Re-Authentication 339
Logical Architecture 341
Stored Procedures 341
Stored Procedure Encryption 343
Bypassing Access Controls 343
Uploading Files 344
Extended Stored Procedure Trojans 344
Global Temporary Stored Procedures 345
Triggers 346
02_578014 ftoc.qxd 6/3/05 6:51 PM Page xix

Contents xix

Users and Groups 347


Account Information 347
Common Accounts 348
Roles 348
Password Encryption 350
SQL Server Agent Password 351
Role Passwords 352
DTS Package Passwords 352
Replication Passwords 353
Chapter 22 SQL Server: Exploitation, Attack, and Defense 355
Exploitation 355
Exploiting Design Flaws 355
The SQL Slammer Overflow 356
\x08 Leading Byte Heap Overflow 356
\x0A Leading Byte Network DoS 357
Client Overflows 357
SQL Injection 358
System-Level Attacks 362
Alternative Attack Vectors 363
Time Delays 364
Stored Procedures 365
Port Scanning 367
Batched Queries 368
Defending Against SQL Injection 368
Covering Tracks 370
Three-Byte Patch 370
XSTATUS Backdoor 373
Start-Up Procedures 373
Chapter 23 Securing SQL Server 375
Installation 375
Step 1: Authentication 375
Step 2: Password Strength 377
Step 3: Operating System Lockdown 377
Step 4: Post-Installation Lockdown 378
Configuration 379
Step 5: Configure Network Libraries 379
Step 6: Configure Auditing and Alerting 379
Step 7: Lock Down Privileges 379
Step 8: Remove Unnecessary Features and Services 381
Step 9: Remove Stored Procedures 382
Step 10: Apply Security Patches 383
02_578014 ftoc.qxd 6/3/05 6:51 PM Page xx

xx Contents

Part VIII PostgreSQL 385


Chapter 24 The PostgreSQL Architecture 387
Examining the Physical Database Architecture 387
Secure Deployment 387
Common Deployment Scenarios 389
Terminology 389
The PostgreSQL File Structure 389
Protocols 391
Authentication 392
The System Catalogs 396
Examining Users and Groups 399
Stored Procedures 400
Chapter 25 PostgreSQL: Discovery and Attack 403
Finding Targets 403
The PostgreSQL Protocol 404
Network-Based Attacks Against PostgreSQL 406
Network Sniffing 406
ARP Spoofing and TCP Hijacking 406
Ident Spoofing 407
Information Leakage from Compromised Resources 408
Known PostgreSQL Bugs 409
Configuration Vulnerabilities 411
Code Execution Vulnerabilities 412
Vulnerabilities in PostgreSQL Components 416
SQL Injection with PostgreSQL 418
Useful Built-In Functions 421
Using Time Delay on PostgreSQL 8.0 422
SQL Injection in Stored Procedures 423
SQL Injection Vulnerabilities in Other Applications 424
Interacting with the Filesystem 425
Large Object Support 427
Using Extensions via Shared Objects 428
The LOAD Command 429
Summary 432
Chapter 26 Securing PostgreSQL 433
Appendix A Example C Code for a Time-Delay SQL Injection Harness 437
Appendix B Dangerous Extended Stored Procedures 441
Registry 442
System 443
E-Mail 445
OLE Automation 446
Appendix C Oracle Default Usernames and Passwords 447
Index 469
Other documents randomly have
different content
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

ebooknice.com

You might also like