Vulnerability Detection For SQL Injection Attacks An Experimental Survey
Vulnerability Detection For SQL Injection Attacks An Experimental Survey
ISSN: 2278-0181
Vol. 2 Issue 6, June - 2013
1. Introduction examples:
www.example.org/display.php?item=1
will sent the info for item 1
SQL Injection Attacks are most effective method
www.example.org/display.php?item=1'
for stealing the data from backend[1].In this type of
will trigger an error, but suppresses it so no
attacks hacker attacks the data by appending Sql
information is shown. But it is still possible to
keywords in user inserted query without enabling
send SQL requests to the database and determine
the user to come to know that query has been
what is true and what is false.
modified.
2.5 Cross-site Scripting
XSS (Cross-site Scripting) allows an attacker to
2. Types of Sql injection attacks execute a dynamic script such as Javascript,
VbScript etc[2]. This allows several different
attacks opportunities for attackers, mostly hijacking
There are several types of attacks. Some of them
the current session of the user.
are discussed in this paper.
2.1 Tautologies 2.6 URL-Based
In this type of attacks malicious code is inserted in URL-Based SQL injection is an attack that can be
executed directly from the browser's address
such a way that query statement is always
bar[3], in which malicious code is inserted into
evaluated to be true.
strings that are later passed to an instance of SQL
“Select * from stud where id=‟111‟ and pwd=‟abc‟
or „1‟=‟1‟” Server for parsing and execution.
In above query by using „1‟=‟1‟ result will always
be true whether pwd is correct or not. 3. SQL Injection Detection tools
2.2 Union Query
In this type of query unauthorised query is attached The tools which are used in this research paper are
with authorised by using UNION clause. available in market but for this research paper one
Select name, address from user where id=1 month trial versions of tool have been used.
3.1 Sqlmap[3]
sqlmap is an open source testing tool which is used
for detection and exploitation of SQL injection
flaws and taking over of database servers. It has that helps in auditing website. It has a vulnerability
advanced detection engine, it is suitable for the scanner and a series of security tools. It can scan
ultimate penetration testing. website for web vulnerabilities cross-site scripting,
3.2 Netsparker[4] URL sql injectioin etc.
Netsparker is the web application security scanner. 3.4 Havij[6]
It discover the flaws that could leave user Havij is an automated SQL Injection tool that helps
dangerously exposed. Netsparker is a powerful web penetration testers to find and exploit SQL
application security scanner, which can crawl, Injection vulnerabilities on a web page.
attack and identify vulnerabilities in all types of
web application - whatever platform and 4. Comparison of tools with respect to
technology it‟s built on. Netsparker can help user vulnerabilities when run on different
identify web application vulnerabilities such as
Cross-site Scripting (XSS), and many more with an types domains.
easy-to-use and intuitive user interface. Netsparker
helps web application developers or penetration In this research paper, 38 websites, which belong
testers to secure web applications easily and with to different domain types (like product based,
the minimum of fuss. portal etc) have been checked for vulnerability
3.3 Webcruiser[5] using above mentioned tools. Result is shown in
WebCruiser is a web vulnerability scanner, an the table given below:
effective and powerful web penetration testing tool
Sno Website type Website domain Tools and type of attacks detected by tools
Netsparker Sqlmap Webcruiser Havij
1. Product based Quiltchalet.com Cross-site scripting, Boolean based Cross-site Not able to
Boolean based sql blind scripting find attack
injection
RT
2. Product based Sigmaspa.com Cross-site scripting, Not able to find Cross-site Not able to
error scripting find attack
3. Product based Kbnusa.com Cross-site scripting, Not able to find Cross-site Not able to
IJE
14. Product based Reaplasrack.co.uk Cross-site scripting Union query Url sql injection Not able to
injectable find attack
15. Education Woodlandsschool. Cross-site scripting, Not able to find Not able to find Not able to
5. Evaluation of tools
In above table 38 websites have been checked for commerce and remaining 12 are kept in category of
vulnerabilities out of these 38 websites, 9 are others.
product based websites,5 are social sites, 6 are
portals, 4 are publishing websites, 2 belong to e-
Havij 9 websites have 5 websites 6 websites have 4 websites have 2 websites have 12 websites
been checked for have been been checked for been checked for been checked for have been
vulnerabilities. In checked for vulnerabilities. In vulnerabilities. In vulnerabilities. In checked for
all not able to find vulnerabilities all not able to find all not able to find all not able to find vulnerabilities.
any error . In all not any error any error any error In all not able to
able to find find any error
any error
Websites belong to different types( like production
6. Conclusion based, portal, social site etc), to detect vulnerability
for sql injection attacks, it is found that Netsparker
Based on the above result , in which four different is able to detect Cross-site scripting and Boolean
sql injection detection tools are used, on different sql injection. Sqlmap is able to detect Boolean
based and Union query. Webcruiser is able to
7. References