George,
Could it have been plugin #11139, sql_injection.nasl?
yes that's the plugin, I recognize the text of the report from the script.
Thanks for the link. When I searched around it appeared that you'd need to
do a large number of queries to get anywhere and so would need a tool to
auto that. And could not find much on simple ways to determine if it is a
false positive.
Sullo said things are pretty "rough" in the area still.
I guess I will leave it at being a possible vuln that is not trivial to
exploit and not worth our pentesters time to prove and give general
mitigation.
thanks,
~D
From: "George A. Theall" <[EMAIL PROTECTED]>
To: [email protected]
Subject: Re: SQL injection plugin
Date: Wed, 14 Feb 2007 21:02:11 -0500
On Wed, Feb 14, 2007 at 09:39:41PM +0000, Datdamwuf Datdamwuf wrote:
Nessus gave me a hit on callbook, port 2000 for Blind SQL Injection but
the report (someone else ran it) did not have the plugin ID and my
searches on the plugins were not successful.
Could it have been plugin #11139, sql_injection.nasl?
The link in the vuln was somewhat helpful but I wondered if anyone has a
good resource(s) for more info on this vuln and also if anyone can
recommend a good open source tool to test Blind SQL injection?
cgisecurity.com recently published an interview with sullo, author of
nikto:
http://www.cgisecurity.com/interviews/nikto.shtml
When the topic of blind SQL injection came up, Sullo said things are pretty
"rough" in the area still.
George
--
[EMAIL PROTECTED]
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus
_________________________________________________________________
FREE online classifieds from Windows Live Expo buy and sell with people
you know
http://clk.atdmt.com/MSN/go/msnnkwex0010000001msn/direct/01/?href=http://expo.live.com?s_cid=Hotmail_tagline_12/06
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus