Journal article

ANTAL Lukáš, BARABAS Maroš and HANÁČEK Petr. Kompromitace dat pomocí SQL Injection, část II. DSM Data Security Management. 2014, vol. 18, no. 2, pp. 32-35. ISSN 1211-8737.
Publication language:czech
Original title:Kompromitace dat pomocí SQL Injection, část II.
Title (en):Data compromise by SQL Injection, part II.
Journal:DSM Data Security Management, Vol. 18, No. 2, CZ
attack, compromise, injection, OWASP, SQL, validation, web
In previous work we described the classic SQL Injection exploits used for theft or modification of database data. After discovery of SQL injection in application, the goals of attacker do not have to stay only in database. The attacker can try with SQL Injection to read files on the local disk and even write to the disk, it may carry out an attack through XSS (Cross Site Scripting) and scan ports on the internal network.
   author = {Luk{\'{a}}{\v{s}} Antal and Maro{\v{s}} Barabas
	and Petr Han{\'{a}}{\v{c}}ek},
   title = {Kompromitace dat pomoc{\'{i}} SQL Injection,
	{\v{c}}{\'{a}}st II.},
   pages = {32--35},
   journal = {DSM Data Security Management},
   volume = 18,
 number = 2,
   year = 2014,
   ISSN = {1211-8737},
   language = {czech},
   url = {}

Your IPv4 address:
Switch to https