Penetration test method using blind SQL injection based on second-order fragment and reassembly
How to get rid of the blindness of current SQL injection penetration test,produce the optimized attack pattern of SQL injection,enhance the effectiveness in the phase of attack generation,and improve the accuracy of vulnerability detection of SQL injection using penetration test,is a big challenge.I...
Saved in:
| Main Authors: | De-guang LE, Sheng-rong GONG, Shao-gang WU, Feng XU, Wen-sheng LIU |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2017-10-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017238/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A Systematic Literature Review on SQL Injection Attacks
by: Maryam Mehmood, et al.
Published: (2024-02-01) -
Penetration Testing pada Kerentanan Keamanan Sistem PELAKAT Menggunakan SQL Injection
by: Khairul, et al.
Published: (2025-05-01) -
Approach to detecting SQL injection behaviors in network environment
by: Yu-fei ZHAO, et al.
Published: (2016-02-01) -
A WEB-APPLICATION QUALITY ASSESSMENT MODEL BASED ON SQL-INJECTION VULNERABILITY DETECTION
by: D. E. Onoshko, et al.
Published: (2019-06-01) -
Reassembly of a tropical rainforest: A new chronosequence in the Chocó tested with the recovery of tree attributes
by: Sebastián Escobar, et al.
Published: (2025-02-01)