24x7 Service; AnyTime; AnyWhere

SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks

Bashah Mat Ali, Abdul and Yaseen Ibrahim Shakhatreh, Ala’ and Abdullah, Mohd Syazwan and Alostad, Jasem (2011) SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks. Procedia Computer Science, 3. pp. 453-458. ISSN 18770509

[thumbnail of SQL-i.pdf] PDF
Restricted to Repository staff only

Download (209kB)


Securing the web against frequent cyber attacks is a big concern as attackers usually intend to snitch private information,financial information, deface and damages websites to prove their hacking capabilities. This type of vandalism may drive many corporations that conduct their business through the web to suffer financial and reputation damages. One of the most dangerous cyber attacks is the Structured Query Language (SQL)-injection attack, whereby this type of attack can be launched through the web browsers. The vulnerability of SQL-injection attack can be attributed to inappropriate programming practice by the website developers, which leaves a lot of doors widely open for the attackers to exploit these and gaining access to confidential information that resides in the website server databases.In order to address this vulnerability, it must be feasible to detect the vulnerability and enhance the coding structure of the website to avoid being an easy victim to this type of cyber attacks. Detecting the SQL-injection vulnerability requires the development of a powerful tool that can automatically create SQLinjection attacks using efficient features (different attacking patters) to detect the vulnerability of the websites. This paper discuss the development of a new web scanning (MySQLlInjector) tool with enhanced features that will be able to conduct efficient penetration test on PHP (started as Personal Home Page but now widely used as Hypertext Preprocesses) based websites to detect SQL injection vulnerabilities.This tool will automate the penetration test process, to make it easy even for those who are not aware familiar about hacking techniques.

Item Type: Article
Uncontrolled Keywords: Database Security; SQL Injection; SQL Vulnerability;
Subjects: Q Science > QA Mathematics > QA76 Computer software
Divisions: College of Arts and Sciences
Depositing User: Mrs. Norazmilah Yaakub
Date Deposited: 15 Feb 2012 02:12
Last Modified: 15 Feb 2012 02:12

Actions (login required)

View Item View Item