Penetration Testing mailing list archives

Re: Invision Power Board Army System Mod <= 2.1 SQL Injection Exploit


From: Crispin Cowan <crispin () novell com>
Date: Mon, 20 Feb 2006 17:33:01 -0800

Cristian Stoica wrote:
   I have a question:
   If you use an ecryption algorithm to store/get data into/from the
database you will not be able to do SQL injections ?
   With a simple encryption algorithm, I do with php explode,
transform the string into an array and run the algorithm on each
member of the array.
There are actually several papers on this idea by Angelos Keromytis and
his students & colleagues:

@inproceedings
  (
    kc03,
    author = "Gaurav S. Kc and Angelos D. Keromytis and Vassilis
Prevelakis",
    title = "{Countering Code Injection Attacks With Instruction Set
            Randomization}",
    booktitle = "Proceedings of the 10th ACM Conference on Computer and
    Communications Security (CCS 2003)",
    address = "Washington, DC",
    month = "October",
    year = 2003,
  )

Crispin
-- 
Crispin Cowan, Ph.D.                      http://crispincowan.com/~crispin/
Director of Software Engineering, Novell  http://novell.com
        Olympic Games: The Bi-Annual Festival of Corruption



------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner: 

Hackers are concentrating their efforts on attacking applications on your 
website. Up to 75% of cyber attacks are launched on shopping carts, forms, 
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are 
futile against web application hacking. Check your website for vulnerabilities 
to SQL injection, Cross site scripting and other web attacks before hackers do! 
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------


Current thread: