2011
DOI: 10.1016/j.procs.2010.12.076
|View full text |Cite
|
Sign up to set email alerts
|

SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks

Abstract: Securing the web against frequent cyber attacks is a big concern as attackers usually intend to snitch private information, financial information, deface and damages websites to prove their hacking capabilities. This type of vandalism may drive many corporations that conduct their business through the web to suffer financial and reputation damages. One of the most dangerous cyber attacks is the Structured Query Language (SQL)-injection attack, whereby this type of attack can be launched through the web browser… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 28 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…Ref. [17] designed an SQLi scanning model using the MySQL injector tool that can easily conduct penetration tests on a PHP-based website. The tool contains four developmental phases in which phase one is called Inception.…”
Section: Related Workmentioning
confidence: 99%
“…Ref. [17] designed an SQLi scanning model using the MySQL injector tool that can easily conduct penetration tests on a PHP-based website. The tool contains four developmental phases in which phase one is called Inception.…”
Section: Related Workmentioning
confidence: 99%
“…If it is wrong, then the website page has a very significant different characteristic (W. G. Halfond, Viegas, & Orso, 2006). Research on Blind SQL injection was carried out by Ali et al with an application called MySQLInjector that scans website servers to detect hidden SQL vulnerable gaps that are efficient in penetrating their targets (Ali, Shakhatreh, Abdullah, & Alostad, 2011). MySQLInjector has three Blind SQL features, including Blind SQL Injection based on True/False response, True/Error response and Order by.…”
Section: B Blind Sql Injectionmentioning
confidence: 99%
“…Penetration testing tools such as MySQLInjector [13], V1p3R (Viper) [14], Sania [15], SAFELI [16], WAVES [17], [18], and [19] gather information from the web application and in order to analyze the application's response, they inject attacks according to the information gathered. V1p3R uses stored error patterns, and Sania uses SQL parse tree comparison for SQLIA detection.…”
Section: Staticmentioning
confidence: 99%