Counteraction for Unauthorized Access to Server of Web-applications Using Mechanism of Spurious SQL-queries
Authors: Medvedev N.V., Bykov A.Yu., Grishin G.A. | Published: 21.03.2014 |
Published in issue: #3(64)/2006 | |
DOI: | |
Category: Informatics & Computing Technology | |
Keywords: |
The feasibility to create spurious SQL-queries for gaining the access to data of interest and to be eligible for administering the server is considered. This approach is used in case of the maximal server security when the 80th port alone can be used for the penetration. Basic recommendations on how to counteract the similar attacks are given.