SQL Injection and IoT Security Testing: Shieldcast - Winter 2018

QASource QASource | February 14, 2018

IoT Security Testing Services

Threat Modeling
Develop comprehensive threat models of entire IoT system that can evolve and live with complete product lifecycle.
Device Design
Ensure hardware issues don’t become the loopholes of your software security architecture.
IoT Penetration Testing
Perform penetration testing of IoT mobile application, cloud APIs, communication protocols, and embedded hardware and firmware or any other segment that comprises complete IoT system.
Hardware Testing
Analyze the physical security and internal architecture of the device. Perform tests to bypass authentication, intercept traffic, inject commands by reconfiguring devices hardware.
Protocol Testing
Examine the security of communication protocols. Tests may examining the cryptographic security of encrypted transmissions, capture and modify transmitted data, and communication protocol fuzzing.
Firmware Testing
Extract and analyze the content of the firmware. Attempt to discover backdoor accounts, buffer overflows, format strings, injection flaws, and other common vulnerabilities.

Threat Exposure

SQL Injection

SQL Injection (SQLi) is one of the oldest, most prevalent and most dangerous vulnerability. In this type of injection attack, attacker executes malicious SQL statements through web forms that control a web application’s database server.

SQL Injection


  • Access sensitive data from application database
  • Can insert, update or remove data from database
  • Attacker can execute database administration operation which can lead to shutdown of DBMS
  • Opens access to DBMS file system which can result in sharing of sensitive information
  • In severe cases, it can open access to operating system commands

Testing Recommendations

  • Test by inputting special characters like -- (double-hyphen), ; (semicolon), ‘ (single quote), “ (double quote) and other similar characters of special meaning in different flavors of SQL
  • Append universally true expressions like 2>1, at the end of all valid input fields using different expressions coupled with a variety of SQL keywords like AND, OR, UNION etc, to simulate an attack

Useful Tools

  • Sqlmap
  • SQLi Dumper

Evaluation – Tools and Technologies


BlackArch Linux is an Arch Linux-based penetration testing distribution for penetration testers and security researchers.

  • Derived from ArchLinux
  • Can install BlackArch components individually or in groups
  • Offers over 1900 tools organized by category, for security, and forensic
  • Can be used as a standalone live CD or live USB, run from a virtual machine, or be installed to a computer's hard disk
BlackArch Tools
Key Takeaway

AIEngine - AIEngine is the next generation network intrusion detection engine. This interactive packet inspection engine offers features such as DNS domain classification, spam detection, network collector, network forensics, and many others. What’s more interesting about AIEngine is that it has the ability to learn without any human intervention.



We would love to hear your feedback, questions, comments and suggestions. This will help us to make us better and more useful next time.
Share your thoughts and ideas at knowledgecenter@qasource.com


This publication is for informational purposes only and nothing contained in it should be considered legal advice. We expressly disclaim any warranty or responsibility for damages arising out of this information and encourage you to consult with legal counsel regarding your specific needs. We do not undertake any duty to update previously posted materials.

We use cookies to optimize user experience. Click on "Agree and Proceed" to confirm, OR, by continuing, you implicitly accept cookies.