Skip to main content

2018 | OriginalPaper | Buchkapitel

Buffer Overflow and SQL Injection: To Remotely Attack and Access Information

verfasst von : Mehak Khurana, Ruby Yadav, Meena Kumari

Erschienen in: Cyber Security

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In today’s electronic world where data is accessed through internet, intranet, and extranet, the security of the information is an important issue. Buffer overflow attack in software and SQL injection attack in web application are the two main attacks which are explained in this paper with the aim to make user understand that how unintentional flaws get injected, how these flaws lead to vulnerabilities, and how these vulnerabilities are exploited by the attackers. In this paper, the real-time attack example is also shown with its screenshots step by step.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Stamp M (2006) Information security principles and practices. Wiley, Hoboken, NJ Stamp M (2006) Information security principles and practices. Wiley, Hoboken, NJ
2.
Zurück zum Zitat Cowan C, Wagle P, Pu C, Beattie S, Walpole J Buffer overflows: attacks and defenses for the vulnerability of the decade. In: Proceedings of DARPA information survivability conference and expo (DISCEX) Cowan C, Wagle P, Pu C, Beattie S, Walpole J Buffer overflows: attacks and defenses for the vulnerability of the decade. In: Proceedings of DARPA information survivability conference and expo (DISCEX)
3.
Zurück zum Zitat Foster JC, Osipov V, Bhalla N, Heinen N (2005) Buffer overflow attacks detect, exploit, prevent. Syngress Publishing Inc., Rockland Foster JC, Osipov V, Bhalla N, Heinen N (2005) Buffer overflow attacks detect, exploit, prevent. Syngress Publishing Inc., Rockland
4.
Zurück zum Zitat Shaneck M (2003) An overview of buffer overflow vulnerabilities and internet worms. In: CSCI, 10 Dec 2003 Shaneck M (2003) An overview of buffer overflow vulnerabilities and internet worms. In: CSCI, 10 Dec 2003
5.
Zurück zum Zitat Kak A (2015) Buffer overflow attack. In: Lecture Notes on Computer and Network Security, Purdue University, 2 April 2015 Kak A (2015) Buffer overflow attack. In: Lecture Notes on Computer and Network Security, Purdue University, 2 April 2015
7.
Zurück zum Zitat Halfond WGJ, Viegas J, Orso A (2006) A classification of SQL injection attacks and countermeasures. In: Proceedings of the international symposium on secure software engineering, Mar 2006 Halfond WGJ, Viegas J, Orso A (2006) A classification of SQL injection attacks and countermeasures. In: Proceedings of the international symposium on secure software engineering, Mar 2006
8.
Zurück zum Zitat Halfond WGJ, Orso A (2005) Combining static analysis and runtime monitoring to counter SQL-injection attacks. In: Proceedings of the international workshop on dynamic analysis (WODA), May 2005 Halfond WGJ, Orso A (2005) Combining static analysis and runtime monitoring to counter SQL-injection attacks. In: Proceedings of the international workshop on dynamic analysis (WODA), May 2005
9.
Zurück zum Zitat Halfond WGJ, Anand S, Orso A (2009) Precise interface identification to improve testing and analysis of web applications. In: Proceedings of the international symposium on software testing and analysis (STA), July 2009 Halfond WGJ, Anand S, Orso A (2009) Precise interface identification to improve testing and analysis of web applications. In: Proceedings of the international symposium on software testing and analysis (STA), July 2009
10.
Zurück zum Zitat Boyd SW, Keromytis AD (2004) SQLrand: preventing SQL injection attacks. In: Lecture Notes in Computer Science, vol 3089. Springer, pp 292–302 Boyd SW, Keromytis AD (2004) SQLrand: preventing SQL injection attacks. In: Lecture Notes in Computer Science, vol 3089. Springer, pp 292–302
11.
Zurück zum Zitat Dougherty C (2012) Practical identification of SQL injection vulnerabilities, Carnegie Mellon University. Produced for US-CERT, a government organization, 2012 Dougherty C (2012) Practical identification of SQL injection vulnerabilities, Carnegie Mellon University. Produced for US-CERT, a government organization, 2012
Metadaten
Titel
Buffer Overflow and SQL Injection: To Remotely Attack and Access Information
verfasst von
Mehak Khurana
Ruby Yadav
Meena Kumari
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-8536-9_30