Second-order SQL injection attack defense method
A technique of injecting attacks and statements, applied in the information field, can solve problems such as complex second-order SQL injection, data loss and tampering, and system control, so as to reduce attack loads stored in the database, defend against SQL injection attacks, and improve security protection Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0038]Embodiment 1 is an example of a second-order SQL injection attack in which user input includes SQL keywords. Assuming that the attacker registers on a certain website, enter "test'or 1=1;--" as the user name, and "123" as the password, and the corresponding static SQL statement in the WEB source program is INSERT INTO User(userName,password) VALUES('?','?'); Assuming that the randomly generated number r and the shared key K are subjected to XOR operation, R is 6573. After SQL keyword conversion, the static SQL statement becomes INSERT6573 INTO6573 User(userName ,password)VALUES6573('?','?'); The WEB server splices the static SQL statement part and the user dynamic input part, and the SQL statement at this time is INSERT6573INTO6573 User(userName,password)VALUES6573('test'or 1 =1; --', '123'); The proxy server deployed and configured by the present invention intercepts the SQL statement that the WEB server sends to the database server, and finds that the user input contai...
Embodiment 2
[0040] Embodiment 2 is an example of a second-order SQL injection attack in which the user input does not contain SQL keywords. Suppose an attacker registers on a certain website, enters "admin';--" as the user name, and "123" as the password. The corresponding static SQL statement in the WEB source program is INSERT INTO User(userName,password)VALUES('?','?'); assuming that the randomly generated number r and the shared key K are subjected to XOR operation, R is 6573 , the static SQL statement becomes INSERT6573 INTO6573 User(userName,password)VALUES6573('?','?') after SQL keyword transformation; the WEB server splices the static SQL statement part with the user's dynamic input part. At this time The SQL statement is INSERT6573 INTO6573User (userName, password) VALUES6573 ("admin';--", "123"); the proxy server that has realized the scheme of the present invention intercepts the SQL statement that the WEB server sends to the database server, and uses the regular expression met...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 



