Design and Implementation of an Automatic Scanning Tool of SQL Injection Vulnerability Based on Web Crawler

Author(s):  
Xiaochun Lei ◽  
Jiashi Qu ◽  
Gang Yao ◽  
Junyan Chen ◽  
Xin Shen
2021 ◽  
pp. 678-687
Author(s):  
Zhiqiang Wang ◽  
Ziyi Wang ◽  
Zhuoyue Wang ◽  
Zhirui Zhang ◽  
Tao Yang

2013 ◽  
Vol 2013 ◽  
pp. 1-11 ◽  
Author(s):  
Ying-Chiang Cho ◽  
Jen-Yi Pan

Over the years, human dependence on the Internet has increased dramatically. A large amount of information is placed on the Internet and retrieved from it daily, which makes web security in terms of online information a major concern. In recent years, the most problematic issues in web security have been e-mail address leakage and SQL injection attacks. There are many possible causes of information leakage, such as inadequate precautions during the programming process, which lead to the leakage of e-mail addresses entered online or insufficient protection of database information, a loophole that enables malicious users to steal online content. In this paper, we implement a crawler mining system that is equipped with SQL injection vulnerability detection, by means of an algorithm developed for the web crawler. In addition, we analyze portal sites of the governments of various countries or regions in order to investigate the information leaking status of each site. Subsequently, we analyze the database structure and content of each site, using the data collected. Thus, we make use of practical verification in order to focus on information security and privacy through black-box testing.


2013 ◽  
Vol 2013 ◽  
pp. 1-10 ◽  
Author(s):  
Ying-Chiang Cho ◽  
Jen-Yi Pan

Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.


Sign in / Sign up

Export Citation Format

Share Document