Home page logo

webappsec logo WebApp Sec mailing list archives

RE: SQL Injection and MSSQL
From: "Amichai Shulman" <shulman () imperva com>
Date: Mon, 28 Jun 2004 08:31:04 +0200

There are many evasion techniques. Some of them as you mentioned are
related to URL encoding and redundant UTF-8 representation. However
there are more advanced techniques that are derived from the SQL
language capabilities. I'd refer you to a WP we wrote on the subject

-----Original Message-----
From: lipe! [mailto:lipe () brturbo com] 
Sent: Saturday, June 26, 2004 12:14 PM
To: webappsec () securityfocus com
Subject: SQL Injection and MSSQL

Hi all,

With filters like "if the parameter has substring 'SELECT'" a malicious
user can mask the 'select' from a request in ASP?

I mean something like (that i know witch works in MySQL)

MS SQL Server has anyway to mascarade the querys, like some unicode
feature or string functions?

I just need to know if theres anyway that i can put a select in a query
without typing explicit "select". If there, why?

Many thanks!

Felipe Santos Andrade <lipe () brturbo com>
Desenvolvedor TI/WEB Framework .NET

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]