Page 1095 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1095

applications offer a portal into those databases, and attackers may
               leverage database-backed web applications to direct attacks against

               databases, including SQL injection attacks.



                             SQL injection attacks and other web applications


                  vulnerabilities are discussed in more detail in Chapter 21,
                  “Malicious Code and Application Attacks.” Database security issues
                  are covered in Chapter 9, “Security Vulnerabilities, Threats, and
                  Countermeasures.”



               Database vulnerability scanners are tools that allow security
               professionals to scan both databases and web applications for
               vulnerabilities that may affect database security. sqlmap is a
               commonly used open-source database vulnerability scanner that
               allows security administrators to probe web applications for database

               vulnerabilities. Figure 15.6 shows an example of sqlmap scanning a
               web application.




































               FIGURE 15.6 Scanning a database-backed application with sqlmap
   1090   1091   1092   1093   1094   1095   1096   1097   1098   1099   1100