2021
DOI: 10.30998/string.v6i2.11477
|View full text |Cite
|
Sign up to set email alerts
|

Teknik Uji Penetrasi Web Server Menggunakan SQL Injection dengan SQLmap di Kalilinux

Abstract: <p><em>In recent years cases of cyber attacks that lead to website security have increased. The most widely used website hacking threat is sql injection. By using the sqlmap tool that runs on the Kalilinux  operating system, attackers can easily take over very important user authentication data with their passwords. Attackers only use a special SQL query script using the python programming language will force the web server to output database information, tables, columns and data contents. This sql… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 0 publications
0
3
0
1
Order By: Relevance
“…This cybercrime threat can occur because of inputs that are not properly filtered in its manufacture, so it creates a loophole that can be abused [8], an example of which can be seen in In the absence of a filter on the website url, most likely, the website is vulnerable to SQL injection [9]. For example can be seen in Figure 1, the address www.example/id.php?=1, behind the url address, there is a GET method, meaning that the url is requesting access to the database with the syntax, "Select * from example where id =1, here the database returns a value, to display all tables with id = 1, therefore, if the attacker knows the structure of the website's database, then the attacker can retrieve all existing data in the database of the attacked website [10]. Every year the attack with the highest percentage is SQL injection [11], which can be seen in Fig.…”
Section: Sql Injectionmentioning
confidence: 99%
“…This cybercrime threat can occur because of inputs that are not properly filtered in its manufacture, so it creates a loophole that can be abused [8], an example of which can be seen in In the absence of a filter on the website url, most likely, the website is vulnerable to SQL injection [9]. For example can be seen in Figure 1, the address www.example/id.php?=1, behind the url address, there is a GET method, meaning that the url is requesting access to the database with the syntax, "Select * from example where id =1, here the database returns a value, to display all tables with id = 1, therefore, if the attacker knows the structure of the website's database, then the attacker can retrieve all existing data in the database of the attacked website [10]. Every year the attack with the highest percentage is SQL injection [11], which can be seen in Fig.…”
Section: Sql Injectionmentioning
confidence: 99%
“…Assailants alter SQL Injection to get data and the information base server, permitting them to enter the framework without a record. Accordingly, aggressors can control information inside the data set [17]. The security vulnerability is exposed when an attacker inputs string values and other control characters into SQL statements by modifying the SQL commands stored in the client application's memory.…”
Section: J Sql Injectionmentioning
confidence: 99%
“…The Mole (Aprilia Monica Sari) menjadi perangkat yang baik untuk pemula yang sedang belajar dalam melakukan penetrasi pada sistem, jaringan, dan aplikasi [9], karena di dalam kali linux terdapat lebih dari 300 tools dengan fungsinya masingmasing yang dapat dimanfaatkan untuk melakukan pengujian keamanan pada suatu sistem [10].…”
Section: Pengukuran Efektivitas Sql Injection Pada Website Dengan Men...unclassified