期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
LDAP Injection Techniques
1
作者 Jose Maria ALONSO Antonio GUZMAN +1 位作者 Marta BELTRAN rodolfo bordon 《Wireless Sensor Network》 2009年第4期233-244,共12页
The increase in the number of databases accessed only by some applications has made code injection attacks an important threat to almost any current system. If one of these applications accepts inputs from a client an... The increase in the number of databases accessed only by some applications has made code injection attacks an important threat to almost any current system. If one of these applications accepts inputs from a client and executes these inputs without first validating them, the attackers are free to execute their own queries and therefore, to extract, modify or delete the content of the database associated to the application. In this paper a deep analysis of the LDAP injection techniques is presented. Furthermore, a clear distinction between classic and blind injection techniques is made. 展开更多
关键词 WEB Applications SECURITY CODE INJECTION TECHNIQUES LDAP
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部