{"id":730,"date":"2013-03-26T19:51:21","date_gmt":"2013-03-26T17:51:21","guid":{"rendered":"https:\/\/www.asafety.fr\/?p=730"},"modified":"2014-10-18T16:18:00","modified_gmt":"2014-10-18T14:18:00","slug":"bsqli-cheat-sheet-multi-databases","status":"publish","type":"post","link":"https:\/\/www.asafety.fr\/en\/projects-and-tools\/bsqli-cheat-sheet-multi-databases\/","title":{"rendered":"(B)SQLi Cheat Sheet multi-databases"},"content":{"rendered":"<p><\/p>\n<p><a href=\"https:\/\/www.asafety.fr\/wp-content\/uploads\/sqli.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-733 alignleft\" alt=\"sqli\" src=\"https:\/\/www.asafety.fr\/wp-content\/uploads\/sqli.jpg\" width=\"171\" height=\"164\" \/><\/a>Dans le cadre d&#8217;audits, d&#8217;\u00e9valuations et de pentests orient\u00e9s vers les applications web qui exploitent des bases de donn\u00e9es, les vuln\u00e9rabilit\u00e9s de type &#8220;<em><a title=\"OWASP SQLi\" href=\"https:\/\/www.owasp.org\/index.php\/SQL_Injection\" target=\"_blank\">SQL Injection<\/a><\/em>&#8221; (SQLi) ou &#8220;<em><a title=\"OWASP BSQLi\" href=\"https:\/\/www.owasp.org\/index.php\/Blind_SQL_Injection\" target=\"_blank\">Blind SQL Injection<\/a><\/em>&#8221; (BSQLi) font parties de celles les plus courante et les plus d\u00e9vastatrices.<\/p>\n<p>Cette famille de vuln\u00e9rabilit\u00e9s est tr\u00e8s pris\u00e9e par les assaillants. Par le biais de telles failles, des bases de donn\u00e9es compl\u00e8tes peuvent \u00eatre compromises, contenant notamment des identifiants\/mots de passe\/adresse mail de clients.<\/p>\n<p>L&#8217;OWASP classe ces injections en premi\u00e8re position dans son <a title=\"OWASP Top Ten\" href=\"https:\/\/www.owasp.org\/index.php\/Category:OWASP_Top_Ten_Project\" target=\"_blank\">Top Ten<\/a>. Tous les jours de nombreux sites sont compromis par ces vecteurs d&#8217;attaques, dont des banques, des r\u00e9seaux sociaux, des sites de commerce ou m\u00eame gouvernementaux.<\/p>\n<p>Pour un auditeur\/pentester, il est n\u00e9cessaire de se maintenir au courant des derniers vecteurs d&#8217;attaques pour telle ou telle base de donn\u00e9es. Chaque base de donn\u00e9es (MySQL, MSSQL, Oracle&#8230;) dispose d&#8217;une syntaxe, de fonctions et de proc\u00e9dures qui leurs sont propres, facilitant ou restreignant les attaques potentielles.<\/p>\n<p>ASafety vous propose un condens\u00e9 mis au go\u00fbt du jour, s&#8217;inspirant de nombreuses sources de qualit\u00e9s et jug\u00e9es de r\u00e9f\u00e9rences de part le web. Ces &#8220;<em><a title=\"cheat sheet\" href=\"http:\/\/en.wikipedia.org\/wiki\/Cheat_sheet\" target=\"_blank\">cheat sheet<\/a><\/em>&#8216; synth\u00e9tisent les techniques les plus communes comme les plus exotiques pour mener \u00e0 bien une exploitation d&#8217;injection SQL lors d&#8217;un audit et\/ou pentest.<\/p>\n<p>Chaque sp\u00e9cificit\u00e9 propre \u00e0 une base de donn\u00e9es est d\u00e9crite, avec des exemples de syntaxes ou d&#8217;utilisation \u00e0 l&#8217;appui. Tous les PoC ont \u00e9t\u00e9 test\u00e9s par nos soins et valid\u00e9s sur les derni\u00e8res versions en date des bases de donn\u00e9es.<\/p>\n<p>Ces dossiers relatifs aux bases de donn\u00e9es sont centralis\u00e9s sur la page &#8220;<a title=\"SQL Injection\" href=\"https:\/\/www.asafety.fr\/projects\/sql-injection\/\" target=\"_blank\">SQL Injection<\/a>&#8221; d&#8217;ASafety. Une multitude de sources documentaires est pr\u00e9sente pour chacun d&#8217;eux, en plus des d\u00e9veloppements r\u00e9alis\u00e9s par nos soins.<\/p>\n<p>A l&#8217;heure actuelle de la r\u00e9daction de cet article, les <a title=\"SQL Injection\" href=\"https:\/\/www.asafety.fr\/projects\/sql-injection\/\" target=\"_blank\"><em>cheat sheet<\/em> d&#8217;SQL Injection<\/a> des bases suivantes ont \u00e9t\u00e9 r\u00e9alis\u00e9s :<\/p>\n<ul>\n<li><a title=\"MySQL Injection Cheat Sheet\" href=\"https:\/\/www.asafety.fr\/projects\/sql-injection\/mysql-injection-cheat-sheet\/\" target=\"_blank\">MySQL injection cheat sheet<\/a><\/li>\n<li><a title=\"MSSQL Injection Cheat Sheet\" href=\"https:\/\/www.asafety.fr\/projects\/sql-injection\/mssql-injection-cheat-sheet\/\" target=\"_blank\">MSSQL injection cheat sheet<\/a><\/li>\n<li><a title=\"Oracle Injection Cheat Sheet\" href=\"https:\/\/www.asafety.fr\/projects\/sql-injection\/oracle-injection-cheat-sheet\/\" target=\"_blank\">Oracle injection cheat sheet<\/a><\/li>\n<\/ul>\n<p>D&#8217;autres bases de donn\u00e9es seront ajout\u00e9es par la suite.<\/p>\n<p>Pour toutes corrections ou am\u00e9liorations, n&#8217;h\u00e9sitez pas \u00e0 nous <a title=\"Contact\" href=\"https:\/\/www.asafety.fr\/contact\/\" target=\"_blank\">contacter<\/a>.<\/p>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Dans le cadre d&#8217;audits, d&#8217;\u00e9valuations et de pentests orient\u00e9s vers les applications web qui exploitent des bases de donn\u00e9es, les [&hellip;]<\/p>\n","protected":false},"author":1337,"featured_media":733,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[232,15],"tags":[310,309,308,311,315,313,306,209,312,305,314],"class_list":["post-730","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-database-sql","category-projects-and-tools","tag-attack-vector","tag-blind-sql-injection","tag-bsqli","tag-cheat-sheet","tag-delete","tag-insert","tag-oracle-db","tag-pentest","tag-select","tag-sql-server","tag-update"],"_links":{"self":[{"href":"https:\/\/www.asafety.fr\/en\/wp-json\/wp\/v2\/posts\/730","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.asafety.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.asafety.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.asafety.fr\/en\/wp-json\/wp\/v2\/users\/1337"}],"replies":[{"embeddable":true,"href":"https:\/\/www.asafety.fr\/en\/wp-json\/wp\/v2\/comments?post=730"}],"version-history":[{"count":6,"href":"https:\/\/www.asafety.fr\/en\/wp-json\/wp\/v2\/posts\/730\/revisions"}],"predecessor-version":[{"id":1152,"href":"https:\/\/www.asafety.fr\/en\/wp-json\/wp\/v2\/posts\/730\/revisions\/1152"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.asafety.fr\/en\/wp-json\/wp\/v2\/media\/733"}],"wp:attachment":[{"href":"https:\/\/www.asafety.fr\/en\/wp-json\/wp\/v2\/media?parent=730"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.asafety.fr\/en\/wp-json\/wp\/v2\/categories?post=730"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.asafety.fr\/en\/wp-json\/wp\/v2\/tags?post=730"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}