Web Filtering with SQL Injection
Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 4
Abstract
As more businesses and organizations provide online services, the number of web sites or applications which are linked to a database has increased greatly. Often the data held in such databases is confidential or private – and possibly of great interest to a hacker, disgruntled employee, or criminal group. While the database and the server holding it may have been secured, the design of the web interface is often overlooked and could allow unauthorized users access to the database. SQL injection, the use of database commands in the SQL language where user input is expected, remains a top threat. It was the 3rd listed error in the January 2009 “CWE/SANS Top 25 Most Dangerous Programming Errors”[a] and has been the mechanism for a number of prevalent attacks. For example, through most of 2008 there were ongoing, indiscriminate and widespread attacks on vulnerable web sites, which added a link to a malicious file (usually JavaScript) that most web site visitors would unintentionally run on loading the page. This then caused the visitor’s computer to be infected with malware. Even well-known and widely trusted web sites were affected by this problem. This document will illustrate some of the main techniques used in SQL injection, then describe methods that can reduce the effectiveness of such attacks. In addition to usual standard IT best practice, such as logging and regular and prompt patching, the majority of SQL injection vulnerabilities can be moderated through careful and robust programming. It is hoped that the information provided here will highlight the seriousness of leaving this type of flaw unaddressed and promote the improved design of database-linked Internet resources.
An Efficient Synthesis and Biological Properties of 2- [ (5-Methoxy-1H- Benzimidazol-2-yl) Sulfanyl] -N-Phenylacetamide Motief
A new series of 2-[(5-methoxy-1H-benzimidazol-2-yl)sulfanyl]-N-phenylacetamide have been synthesized by the condensation 2-mercapto-5-methoxybenzemidazole and 2- chloro – N – ( Aryl ) – acetamides. The novel compounds st...
Avoiding selective jam attack by packet hiding method in wireless sensor network
the open nature of the wireless medium leaves it vulnerable to drive or wedge packets forcibly into a tight position referred as squeeze. This intentional interference with wireless transmissions can be used as a launch...
Os Trigonum - A Case Report Rosemol Xaviour
Os Trigonum - A Case Report Rosemol Xaviour
Sexual Networking, Sexual Practices and Level of Awareness among MSM on HIV/ AIDS
Filipinos getting infected with HIV-AIDS continued to balloon notwithstanding the intervention through comprehensive prevention, dissemination and control programs. In Eastern Visayas there were 69 cases coming from most...
Utilization of Mother and Child Booklet among Mothers Attending Well Baby Clinic in Nakuru Central District
"ABSTRACT Background: The mother and child health (MCH) booklet is an essential integrated document formulated by the Ministry of Health that provides for linkage of services across the continuum of maternal and neonata...