Dr. Dobb's is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Channels ▼


NTO SQL Invader: Game Over For SQL Injection Vulnerabilities?

Web app security player NT OBJECTives has tabled a new penetration testing tool in the shape of NTO SQL Invader. This free release is targeted at testing pros and the wider development community as a means of identifying SQL injection vulnerabilities in online applications.

Vying to help "exploit and demonstrate" SQL injection vulnerabilities, NT OBJECTives says that "most organizations" understand that SQL injection vulnerabilities put their sensitive data at risk — as it has been the dominant method used in this year's high-profile web application attacks; with millions of sites attacked in 2011.

While SQL injections are comparatively well documented in their own right, NT OBJECTives argues that until now it has been difficult to determine if the vulnerability can actually be exploited because most existing SQL injection testing tools are executed from a command line without a supporting user interface. Without the ability to demonstrate the exploitability of a vulnerability, remediation efforts are naturally delayed.

NTO SQL Invader allows pen testers and developers to view the list of records, tables, and user accounts on the back-end database when a vulnerability surfaces. A user can exploit a web application vulnerability that was discovered manually or from a Dynamic Application Security Testing (DAST) tool like the company's own NTOSpider. NTO SQL Invader works as a standalone tool and includes integration with NTOSpider's reporting technology to identify and validate discovered vulnerabilities.

"Accurate vulnerability identification is a crucial and challenging task but it is only half the battle," says Dan Kuykendall, co-CEO and CTO of NT OBJECTives. "We wanted to support organizations in their analysis and remediation efforts by providing an easy to use tool that enables penetration testers to demonstrate how these vulnerabilities can be exploited. We felt it was important to provide a free and useful tool to our customers and to the entire community."

NTO SQL Invader's GUI interface enables users to paste the injectable request found by the DAST tool into NTO SQL Invader and then select "Start Detecting Injection" to identify the injectable parameter/input. Users can also feed a more detailed request straight into NTO SQL Invader from NTOSpider's report or BurpSuite. Once the injection is identified, the user is in control of how much information is harvested.

"Sometimes it just takes a compelling screenshot or video to silence the skeptics on the validity of a vulnerability. While the command-line tools are effective, they do not present polished, organized, or clear information in a presentation setting," said the company.

Related Reading

More Insights

Currently we allow the following HTML tags in comments:

Single tags

These tags can be used alone and don't need an ending tag.

<br> Defines a single line break

<hr> Defines a horizontal line

Matching tags

These require an ending tag - e.g. <i>italic text</i>

<a> Defines an anchor

<b> Defines bold text

<big> Defines big text

<blockquote> Defines a long quotation

<caption> Defines a table caption

<cite> Defines a citation

<code> Defines computer code text

<em> Defines emphasized text

<fieldset> Defines a border around elements in a form

<h1> This is heading 1

<h2> This is heading 2

<h3> This is heading 3

<h4> This is heading 4

<h5> This is heading 5

<h6> This is heading 6

<i> Defines italic text

<p> Defines a paragraph

<pre> Defines preformatted text

<q> Defines a short quotation

<samp> Defines sample computer code text

<small> Defines small text

<span> Defines a section in a document

<s> Defines strikethrough text

<strike> Defines strikethrough text

<strong> Defines strong text

<sub> Defines subscripted text

<sup> Defines superscripted text

<u> Defines underlined text

Dr. Dobb's encourages readers to engage in spirited, healthy debate, including taking us to task. However, Dr. Dobb's moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing or spam. Dr. Dobb's further reserves the right to disable the profile of any commenter participating in said activities.

Disqus Tips To upload an avatar photo, first complete your Disqus profile. | View the list of supported HTML tags you can use to style comments. | Please read our commenting policy.