|

Counteraction for Unauthorized Access to Server of Web-applications Using Mechanism of Spurious SQL-queries

Authors: Medvedev N.V., Bykov A.Yu., Grishin G.A. Published: 21.03.2014
Published in issue: #3(64)/2006  
DOI:

 
Category: Informatics & Computing Technology  
Keywords:

The feasibility to create spurious SQL-queries for gaining the access to data of interest and to be eligible for administering the server is considered. This approach is used in case of the maximal server security when the 80th port alone can be used for the penetration. Basic recommendations on how to counteract the similar attacks are given.