Nenad Bedeković, Ladislav Havas, Tomislav Horvat, Dražen Crčić
{"title":"The Importance of Developing Preventive Techniques for SQL Injection Attacks","authors":"Nenad Bedeković, Ladislav Havas, Tomislav Horvat, Dražen Crčić","doi":"10.31803/tg-20211203090618","DOIUrl":null,"url":null,"abstract":"Many intentionally vulnerable web applications are circulating on the Internet that serve as a legal test ground for practicing SQL injection attacks. For demonstration purposes the attacks will target an Acunetix test web application created using PHP programming language and MySQL relational database. In the practical part, the execution of the attack itself largely depends on the database management system, so the displayed syntax is intended only for the MySQL database management system. Example of an automated attack will be executed on SQLmap in a Linux Kali virtualized environment. Security guidelines with a purpose of protecting databases are also discussed.","PeriodicalId":43419,"journal":{"name":"TEHNICKI GLASNIK-TECHNICAL JOURNAL","volume":"1 1","pages":""},"PeriodicalIF":0.7000,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"TEHNICKI GLASNIK-TECHNICAL JOURNAL","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31803/tg-20211203090618","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
引用次数: 0
Abstract
Many intentionally vulnerable web applications are circulating on the Internet that serve as a legal test ground for practicing SQL injection attacks. For demonstration purposes the attacks will target an Acunetix test web application created using PHP programming language and MySQL relational database. In the practical part, the execution of the attack itself largely depends on the database management system, so the displayed syntax is intended only for the MySQL database management system. Example of an automated attack will be executed on SQLmap in a Linux Kali virtualized environment. Security guidelines with a purpose of protecting databases are also discussed.