1.

Record Nr.

UNINA9910468025703321

Autore

Aviz João Braz

Titolo

Un homme d'aplomb : Entretiens avec Adelmo Galindo et Michel Zanzucchi / / João Braz Aviz

Pubbl/distr/stampa

Bruyères-le-Châtel : , : Nouvelle cité, , [2014]

©2014

ISBN

2-37582-144-0

Descrizione fisica

1 online resource (137 pages)

Collana

Vie des hommes

Disciplina

262.142

Soggetti

Priests - Brazil - 21st century

Electronic books.

Lingua di pubblicazione

Francese

Formato

Materiale a stampa

Livello bibliografico

Monografia



2.

Record Nr.

UNINA9910483281003321

Titolo

Information Systems Security : 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010 / / edited by Somesh Jha, Anish Mathuria

Pubbl/distr/stampa

Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010

ISBN

3-642-17714-X

Edizione

[1st ed. 2010.]

Descrizione fisica

1 online resource (XIV, 261 p. 60 illus.)

Collana

Security and Cryptology, , 2946-1863 ; ; 6503

Altri autori (Persone)

JhaSomesh

MathuriaAnish <1967->

Disciplina

004.6

Soggetti

Computer networks

User interfaces (Computer systems)

Human-computer interaction

Data protection

Information storage and retrieval systems

Electronic data processing - Management

Biometric identification

Computer Communication Networks

User Interfaces and Human Computer Interaction

Data and Information Security

Information Storage and Retrieval

IT Operations

Biometrics

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Bibliographic Level Mode of Issuance: Monograph

Nota di bibliografia

Includes bibliographical references and index.

Sommario/riassunto

2.1 Web Application Vulnerabilities Many web application vulnerabilities havebeenwell documented andthemi- gation methods havealso beenintroduced [1]. The most common cause ofthose vulnerabilities isthe insu'cient input validation. Any data originated from o- side of the program code, forexample input data provided by user through a web form, shouldalwaysbeconsidered malicious andmustbesanitized before



use.SQLInjection, Remote code execution orCross-site Scriptingarethe very common vulnerabilities ofthattype [3]. Below isabrief introduction toSQL- jection vulnerability though the security testingmethodpresented in thispaper is not limited toit. SQLinjectionvulnerabilityallowsanattackertoillegallymanipulatedatabase byinjectingmalicious SQL codes into the values of input parameters of http requests sentto the victim web site. 1: Fig.1. An example of a program written in PHP which contains SQL Injection v- nerability Figure 1 showsaprogram that uses the database query function mysql query togetuserinformationcorrespondingtothe userspeci'edby the GETinput- rameterusername andthen printtheresultto the clientbrowser.Anormalhttp request with the input parameter username looks like "http://example.com/ index.php'username=bob". The dynamically created database query at line2 is "SELECT * FROM users WHERE username='bob' AND usertype='user'". Thisprogram is vulnerabletoSQLInjection attacks because mysql query uses the input value of username without sanitizingmalicious codes. A malicious code can be a stringthatcontains SQL symbols ork- words.Ifan attacker sendarequest with SQL code ('alice'-') - jected "http://example.com/index.php'username=alice'-", the query becomes "SELECT* FROM users WHERE username='alice'--' AND usertype='user'".