LDAP Injection Techniques
The increase in the number of databases accessed only by some applications has made code injection attacks an important threat to almost any current system. If one of these applications accepts inputs from a client and executes these inputs without first validating them, the attackers are free to execute their own queries and therefore, to extract, modify or delete the content of the database associated to the application. In this paper a deep analysis of the LDAP injection techniques is presented. Furthermore, a clear distinction between classic and blind injection techniques is made.
Web applications security code injection techniques LDAP.
Jose Maria Alonso Rodolfo Bordon Marta Beltran Antonio Guzman
Informatica64 c/Juan Ramon Jimenez 828933 Mostoles,Madrid,Spain. Computing Department,Universidad Rey Juan Carlos,1018 Rectorado 28933 Mostoles,Madrid,Spain.
国际会议
广州
英文
2008-11-19(万方平台首次上网日期,不代表论文的发表时间)