2015 Second International Conference on Information Security and Cyber Forensics (InfoSec) 2015
DOI: 10.1109/infosec.2015.7435521
|View full text |Cite
|
Sign up to set email alerts
|

SQLi vulnerabilty in education sector websites of Bangladesh

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…Error based injection is attempted when basic inject is unable to retrieve all the data. Error based injection is usually attempted when the "union" query fails in normal SQLi [9]. "Union" query retrieves the vulnerable columns in the database.…”
Section: B Error Baeed Sqlimentioning
confidence: 99%
See 3 more Smart Citations
“…Error based injection is attempted when basic inject is unable to retrieve all the data. Error based injection is usually attempted when the "union" query fails in normal SQLi [9]. "Union" query retrieves the vulnerable columns in the database.…”
Section: B Error Baeed Sqlimentioning
confidence: 99%
“…When error based injection vulnerability is identified by but the injection steps fail to return output, double query injection is attempted [9]. Double query injection works with similar principal as the error based injection.…”
Section: Error Based Double Query Injectionmentioning
confidence: 99%
See 2 more Smart Citations
“…In this paper, the authors discuss websites with improper input validation. Improper input validation is responsible for various types of web application-based attacks such as Cross Site Request Forgery (CSRF) [29], Cross Site Scripting (XSS) [30], Structured Query Language (SQLi) [31], [37] Local File Inclusion [32], [33], Broken Authentications [34], Session Management [35], and Local File Discloser [36]. The authors test SQLi-based attacks to measure the severity of improper input validation of some targeted websites.…”
Section: Introductionmentioning
confidence: 99%