PERBANDINGAN TOOLS SQL SUS, SQL NINJA, DAN THE MOLE DALAM PENERAPAN SQL INJECTION

نویسندگان

چکیده

In this modern era, the rapid development of science and technology is certainly very beneficial for human life. However, can also bring threats, such as cyber attacks. One type attack that often used SQL injection, which targets database security. Three tools be in testing injection are sus, ninja, The mole. Testing these three uses two operating systems, Kali Linux Windows. test results measured based on several parameters, namely, speed tool responding to commands, number stages its application, features contained therein, efficiency. Based results, it known only sus successfully injected a website, while other failed.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Preventing SQL Injection Attacks

With the recent rapid increase in web based applications that employ back-end database services, results show that SQL Injection and Remote File Inclusion are the two frequently used exploits rather than using other complicated techniques. With the rise in use of web applications, SQL injection based attacks are gradually increasing and is now one of the most common attacks in the internet. It ...

متن کامل

Inferential SQL Injection Attacks

This paper describes a class of SQL injection attacks (SQLIA) where attackers can deduce information from the back-end database management system (DBMS) without transferring actual data. Instead, by using predetermined differentiation mechanism, information is being inferred piece by piece. Because of its widespread success, particularly in difficult situations where other SQLIA classes fail, u...

متن کامل

SQLrand: Preventing SQL Injection Attacks

We present a practical protection mechanism against SQL injection attacks. Such attacks target databases that are accessible through a web frontend, and take advantage of flaws in the input validation logic of Web components such as CGI scripts. We apply the concept of instruction-set randomization to SQL, creating instances of the language that are unpredictable to the attacker. Queries inject...

متن کامل

SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks

Securing the web against frequent cyber attacks is a big concern as attackers usually intend to snitch private information, financial information, deface and damages websites to prove their hacking capabilities. This type of vandalism may drive many corporations that conduct their business through the web to suffer financial and reputation damages. One of the most dangerous cyber attacks is the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Jurnal Informatika Teknologi dan Sains (Jinteks)

سال: 2022

ISSN: ['2686-3359']

DOI: https://doi.org/10.51401/jinteks.v4i4.2201