Re: Invision Power Board Army System Mod <= 2.1 SQL Injection Exploit



Cristian Stoica wrote:
I have a question:
If you use an ecryption algorithm to store/get data into/from the
database you will not be able to do SQL injections ?
With a simple encryption algorithm, I do with php explode,
transform the string into an array and run the algorithm on each
member of the array.
There are actually several papers on this idea by Angelos Keromytis and
his students & colleagues:

@inproceedings
(
kc03,
author = "Gaurav S. Kc and Angelos D. Keromytis and Vassilis
Prevelakis",
title = "{Countering Code Injection Attacks With Instruction Set
Randomization}",
booktitle = "Proceedings of the 10th ACM Conference on Computer and
Communications Security (CCS 2003)",
address = "Washington, DC",
month = "October",
year = 2003,
)

Crispin
--
Crispin Cowan, Ph.D. http://crispincowan.com/~crispin/
Director of Software Engineering, Novell http://novell.com
Olympic Games: The Bi-Annual Festival of Corruption



------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner:

Hackers are concentrating their efforts on attacking applications on your
website. Up to 75% of cyber attacks are launched on shopping carts, forms,
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are
futile against web application hacking. Check your website for vulnerabilities
to SQL injection, Cross site scripting and other web attacks before hackers do!
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------



Relevant Pages

  • Password "security" - was"Passwords with Lan Manager (LM) under Windows" and &qu
    ... it is limited to 7 characters, when NTLM is up to 14 in older Windows, ... Algorithm 256 encryption algorithm and AES ... etc) will have infinite collisions. ... Final rant, other attacks on passwords... ...
    (Pen-Test)
  • Re: Security of Secret Algorithm encruption
    ... > how difficult is it to attack an arbitrary and unknown algorithm? ... cracks that attackers can use for compromise. ... secret algorithm that was supposed to be widely deployed ... ... so the threat models are not only how difficult are frontal attacks ...
    (sci.crypt)
  • Re: How to pick best encryption algorithm based on application
    ... the optimum encryption algorithms for your particular application. ... severley affected if one algorithm is better at treating a continuous ... AES and other AES contest finalist will be unfeasible to break from a ... we should take in account not only attacks to the algorithm ...
    (sci.crypt)
  • Re: Random delay as a countermeasure to timing attacks
    ... random delays is an efficient countermeasure against timing ... and are the only randomness in the adversary's measurements. ... One of the key features of an algorithm are that it be fast. ... where other attacks such as brute force ...
    (sci.crypt)
  • Re: Invision Power Board Army System Mod <= 2.1 SQL Injection Exploit
    ... If you use an ecryption algorithm to store/get data into/from the ... database you will not be able to do SQL injections? ... member of the array. ... There are actually several papers on this idea by Angelos Keromytis and ...
    (Bugtraq)