یکی از موضوعات بسیار مهم و نگران کننده برای محققان امنیتی تست نفوذ یا حسابرسی وب است. هدف از این اثبات نمودن اثربخشی سیستم امنیتی وب به دلیل حملات سطح کاربردی است که در سر بخش حملات سایبری امروزی رتبه بندی می شود چرا که اینها توسط هکرها/مهاجمین ارجح هستند. فلسفه حسابرسی وب است که تضمین میکند که دارای نقطه ورودی مستقلی برای کاربردهای وب با انجام تستهای نفوذ سنجی ارائه شده با انجام حملات پیچیده در وبسایتها میباشد. داشتن بیش از یک نقطه ورودی برای سیستم به عنوان یک جریان امنیتی در نظر گرفته میشود که هکرها را جهت بهره برداری و سوء استفاده از آن جذب میکند. علاوه بر این، تست نفوذ موجب تحت پوشش قرار دادن بررسی در مقابل طیف وسیعی از آسیب پذیری های وب می شود که مربوط به آسیب پذیریهای سطح کاربردی وب مانند حمله تزریق کد (کراس سایت برنامه نویسی) (XSS)، تزریق SQL، معایب (چارچوب درون خطی) IFRAME، حملات به سرور نام دامنه (DNS)، معایب احراز هویت وب، اجرای کد از راه دور، و گنجاندن فایل از راه دور میباشد [1]. بهرهبرداری هر یک از این آسیب پذیریها ممکن است مهاجمان از راه دور را قادر سازد تا دسترسی مدیریتی به وب سایت آلوده را به دست بیاورند که همین موجب میشود تا آنها دارای قابلیتی برای داشتن کنترل برای محو، خسارت، و دله دزدیهای اعتباری باشند [2].
ابزار اسکن آسیب پذیری تزریق SQL جهت ایجاد اتوماتیک حملات تزریق SQL
9,500 تومانشناسه فایل: 13064
- حجم فایل ورد: 132.7KB حجم پیدیاف: 157.2KB
- فرمت: فایل Word قابل ویرایش و پرینت (DOCx)
- تعداد صفحات فارسی: 9 انگلیسی: 6
- دانشگاه:
- Division of Applied Sciences, College of Arts and Sciences, Universiti Utara Malaysia, 06010 Sintok, Kedah, Malaysia
- The Public Authority for Applied Education and Training (PAAET), College of Business, P.O. Box.23167, Safat 13092, Kuwait
- ژورنال: Procedia Computer Science (5)
مقدمه مقاله
ABSTRACT SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks
Securing the web against frequent cyber attacks is a big concern as attackers usually intend to snitch private information, financial information, deface and damages websites to prove their hacking capabilities. This type of vandalism may drive many corporations that conduct their business through the web to suffer financial and reputation damages. One of the most dangerous cyber attacks is the Structured Query Language (SQL)-injection attack, whereby this type of attack can be launched through the web browsers. The vulnerability of SQL-injection attack can be attributed to inappropriate programming practice by the website developers, which leaves a lot of doors widely open for the attackers to exploit these and gaining access to confidential information that resides in the website server databases. In order to address this vulnerability, it must be feasible to detect the vulnerability and enhance the coding structure of the website to avoid being an easy victim to this type of cyber attacks. Detecting the SQL-injection vulnerability requires the development of a powerful tool that can automatically create SQLinjection attacks using efficient features (different attacking patters) to detect the vulnerability of the websites. This paper discuss the development of a new web scanning (MySQLlInjector) tool with enhanced features that will be able to conduct efficient penetration test on PHP (started as Personal Home Page but now widely used as Hypertext Preprocesses) based websites to detect SQL injection vulnerabilities. This tool will automate the penetration test process, to make it easy even for those who are not aware familiar about hacking techniques.
1. Background
Penetration testing or web auditing is one of the most important topics that security researchers are concerned about. It aims to prove the effectiveness of the website security system because application level attacks rank at the top of nowadays cyber attacks as these are preferred by attackers/hackers. The philosophy behind web auditing is to ensure having a single entry point to web applications by performing penetration tests represented by conducting sophisticated attacks on websites. Having more than one entry point to the system will be considered as a security flaw that attracts potential hackers to exploit it. Moreover, penetration testing covers checking against a wide range of web vulnerabilities which are related to web application level vulnerabilities such as cross-site-scripting (XSS), SQL injection, IFRAME (Inline Frame) flaws, Domain Name Server (DNS) attacks, web authentication flaws, remote code execution, and remote file inclusion [1]. Exploiting any one of these vulnerabilities may enable remote attackers to gain administrative access to the infected website which enable them having the control to deface, damage and snitch credentials [2].
Penetration testing is recommended for those critical or popular websites as it is similar to trying to break into the organization’s IT systems. The aim of penetration testing is to demonstrate the robustness of the security system in order to expose the vulnerabilities and giving advice on how to recover these flaws [3]. Conducting penetration testing is an essential requirement for organizations that deal with critical or huge amount of data that may belong to hundreds and thousands of clients through an automated system or a website [4]. One of the most dangerous attacks that should be recovered in the penetration testing is the SQL injection attack that injects a malicious Javascript or HTML tags into the victim’s website database, or in other words executing malicious SQL queries to inject malicious HTML tags [5,6,1], which is considered as IFRAME attack. On the other hand IFRAME attack can also be carried out through what is known as cross site scripting attack (XSS) as this kind of attack can embed one malicious website in the original website to snitch credentials and to download malware on the visitor’s computer [4,2,1].
Web applications usually interact with backend databases and when the application receives a request from the user, it fetches the database by generating and executing SQL queries to interact with the relational database. These queries look for the requested data to be displayed in generated HTML pages to the user. In this normal scenario, the user inputs are treated as lexical entities. However, when the user inserts unexpected inputs that are not addressed in the web application’s dictionary, they will lead the web server to react abnormally. This may cause the web application to display unexpected data which may be classified as confidential and may be useful for the attacker.
This is known as command injection attack, and such commands could be SQL queries or operating system commands or Javascript & HTML tags. Command injection attack is widespread and more commands injection vulnerabilities will be discovered in the future [7,5,8].
- مقاله درمورد ابزار اسکن آسیب پذیری تزریق SQL جهت ایجاد اتوماتیک حملات تزریق SQL
- پروژه دانشجویی ابزار اسکن آسیب پذیری تزریق SQL جهت ایجاد اتوماتیک حملات تزریق SQL
- اسکن آسیب پذیری تزریق SQL جهت خلق حملات تزریق SQL
- پایان نامه در مورد ابزار اسکن آسیب پذیری تزریق SQL جهت ایجاد اتوماتیک حملات تزریق SQL
- تحقیق درباره ابزار اسکن آسیب پذیری تزریق SQL جهت ایجاد اتوماتیک حملات تزریق SQL
- مقاله دانشجویی ابزار اسکن آسیب پذیری تزریق SQL جهت ایجاد اتوماتیک حملات تزریق SQL
- ابزار اسکن آسیب پذیری تزریق SQL جهت ایجاد اتوماتیک حملات تزریق SQL در قالب پاياننامه
- پروپوزال در مورد ابزار اسکن آسیب پذیری تزریق SQL جهت ایجاد اتوماتیک حملات تزریق SQL
- گزارش سمینار در مورد ابزار اسکن آسیب پذیری تزریق SQL جهت ایجاد اتوماتیک حملات تزریق SQL
- گزارش کارورزی درباره ابزار اسکن آسیب پذیری تزریق SQL جهت ایجاد اتوماتیک حملات تزریق SQL