RE: tool recommendations and sql injection help

From: Carl Davis (cdavis@rvasi.com)
Date: Sun Jul 30 2006 - 00:31:45 EDT


Travis,

Below are some additional free tools you can try that may be helpful:

Sqlninja
http://sqlninja.sourceforge.net/

SQL Power Injector
http://www.sqlpowerinjector.com/index.htm

SQL Injector from NGS Software
http://www.databasesecurity.com/dbsec/sqlinjector.zip

Automagic SQL Injector
http://www.packetstormsecurity.org/UNIX/scanners/automagic.zip

Paros Proxy (Scanning Component)
http://www.parosproxy.org/index.shtml

Also, I am a long time user of WebInspect and would consider using it in
this case if you are not making much headway with manual techniques, other
tools, etc.

Best Regards,

Carl Davis, C|EH, CISSP, MCSE, CCSA
Founder & Team Lead (Ethical Hacker)
RVASI - Ethical Hacking Solutions
Phone: 402.350.8752
Fax: 402.614.5494
Website: http://www.rvasi.com
Forum: http://www.rvasi.com/forum

-----Original Message-----
From: Travis [mailto:teedubb@gmail.com]
Sent: Thursday, July 27, 2006 4:51 PM
To: pen-test@securityfocus.com
Subject: tool recommendations and sql injection help

i am performing an external scan for a company. i have already ran
nessus and nikto. neither one of these turned up any major
vulnearabilities other than a possible sql injection, seen below.

---------------------------------------------------------------------------

Microsoft JET Database Engine error '80040e14'

Syntax error in string in query expression 'NewsID=''.

/news-article.asp, line 15

----------------------------------------------------------------------------

nessus gave the following vulnerability message

----------------------------------------------------------------------------

The following URLs seem to be vulnerable to various SQL injection
techniques :

/news-article.asp?NewsID='UNION'
/news-article.asp?NewsID='
/news-article.asp?NewsID='
/news-article.asp?NewsID='%22
/news-article.asp?NewsID='%22
/news-article.asp?NewsID=9%2c+9%2c+9
/news-article.asp?NewsID=9%2c+9%2c+9
/news-article.asp?NewsID='bad_bad_value
/news-article.asp?NewsID='bad_bad_value
/news-article.asp?NewsID=bad_bad_value'
/news-article.asp?NewsID=bad_bad_value'
/news-article.asp?NewsID='+OR+'
/news-article.asp?NewsID='WHERE
/news-article.asp?NewsID='WHERE
/news-article.asp?NewsID=%3B
/news-article.asp?NewsID=%3B
/news-article.asp?NewsID='OR
/news-article.asp?NewsID='OR

-------------------------------------------------------------------

when i report this vulnearability to the company i want to show
evidence of data that i got from the injection. i have read white
papers on sql injections and i have tried all the usual suspects when
it comes to sql injections but still no luck. is there something
special with Microsoft JET database? what would be some sql
injections i could try to pull back table information? i have tried
an automated too such as Absinthe, not sure how to use it though.

what is your take on commercial software that scans (e.g. webinspect,
saint), should i give those a shot as well or will nessus do the
trick?

----------------------------------------------------------------------------

--
This List Sponsored by: Cenzic
Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's 
Choice Award from eWeek. As attacks through web applications continue to
rise, 
you need to proactively protect your applications from hackers. Cenzic has
the 
most comprehensive solutions to meet your application security penetration 
testing and vulnerability management needs. You have an option to go with a 
managed service (Cenzic ClickToSecure) or an enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can 
help you: http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request@cenzic.com for details.
----------------------------------------------------------------------------
--
------------------------------------------------------------------------------
This List Sponsored by: Cenzic
Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's 
Choice Award from eWeek. As attacks through web applications continue to rise, 
you need to proactively protect your applications from hackers. Cenzic has the 
most comprehensive solutions to meet your application security penetration 
testing and vulnerability management needs. You have an option to go with a 
managed service (Cenzic ClickToSecure) or an enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can 
help you: http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:56:27 EDT