2020
DOI: 10.17163/ings.n25.2021.10
|View full text |Cite
|
Sign up to set email alerts
|

Análisis de vulnerabilidades con SQLMAP aplicada a entornos APEX 5

Abstract: Las bases de datos son usualmente los principales objetivos de un ataque, específicamente por la información que en ella reside, ya que, de acuerdo con Druker, la información es poder. En este trabajo se realizan las pruebas de vulnerabilidad de la base de datos de un software ERP desarrollado en APEX 5. Para ello, se utilizan herramientas FOSS de prueba y análisis de vulnerabilidades de bases de datos, identificando que las sesiones que utiliza ERP basada en Oracle APEX son realizadas de manera aleatoria y qu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 28 publications
0
0
0
Order By: Relevance
“…In this scenario, researchers will use the Sqlmap penetration testing tool to search for and exploit potential SQL Injection vulnerabilities in the targeted web application or system [12] [13]. SQL Injection attacks are one of the most common cyber attacks and can be damaging because they can provide illegal access to database systems [13].…”
Section: Testing Scenarios Using Sqlmapmentioning
confidence: 99%
“…In this scenario, researchers will use the Sqlmap penetration testing tool to search for and exploit potential SQL Injection vulnerabilities in the targeted web application or system [12] [13]. SQL Injection attacks are one of the most common cyber attacks and can be damaging because they can provide illegal access to database systems [13].…”
Section: Testing Scenarios Using Sqlmapmentioning
confidence: 99%