Essays about: "SQL injection"

Showing result 1 - 5 of 21 essays containing the words SQL injection.

  1. 1. SQL injection attacks and countermeasures in PHP, and Cross-Site Request Forgery

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Alexander Sabelström; [2023]
    Keywords : ;

    Abstract : Websites have become a vital tool for any establishment's success. However, all users do not enter websites with good intentions. Two commonly seen website functionalities are a login system and the possibility for users to leave and read reviews. READ MORE

  2. 2. Study of the techniques used by OWASP ZAP for analysis of vulnerabilities in web applications

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Adam Jakobsson; Isak Häggström; [2022]
    Keywords : SQL injection; Cross-site scripting; Web vulnerability scanner; Web security;

    Abstract : Today, new web applications are made every single day with increasingly more sensitive data to manage. To ensure that no security vulnerabilities such as data leakage in web applications exist, developers are using tools such as a web vulnerability scanner. READ MORE

  3. 3. Penetration Testing of an In-Vehicle Infotainment System

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Philip Andersson; [2022]
    Keywords : Cybersecurity; Penetration testing; In-Vehicle Infotainment system; Android Automotive; ISO SAE 21434; Cybersäkerhet; Penetrationstestning; Infotainmentsystem i fordon; Android Automotive; ISO SAE 21434;

    Abstract : With the growing demand for smart and luxurious vehicles, the automotive industry has moved toward developing technologies to enhance the in-vehicle user experience. As a result, most vehicles today have a so-called In-Vehicle Infotainment (IVI) system, or simply an infotainment system, which provides a combination of information and entertainment in one system. READ MORE

  4. 4. Web Penetration testing : Finding and evaluating vulnerabilities in a web page based on C#, .NET and Episerver

    University essay from KTH/Datavetenskap

    Author : Ameena Lundquist Amir; Ivan Khudur; [2022]
    Keywords : Ethical hacking; Penetration testing; Cybersecurity; DREAD; HTTP; HTTPS; Episerver; Kali Linux; Burp Suite; SQL injection; XSS; HTTP Method Tampering; Directory Traversal; HSTS; IDOR; Authentication; MFA;

    Abstract : Today’s society is highly dependent on functional and secure digital resources, to protect users and to deliver different kinds of services. To achieve this, it is important to evaluate the security of such resources, to find vulnerabilities and handle them before they are exploited. This study aimed to see if web applications based on C#, . READ MORE

  5. 5. Evaluation of open source web vulnerability scanners and their techniques used to find SQL injection and cross-site scripting vulnerabilities

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Erik Matti; [2021]
    Keywords : Open source; Web vulnerability scanner; SQL injection; XSS; cross-site scripting; OWASP ZAP; Web security; Web application;

    Abstract : Both for its simplicity and efficiency to search for the most critical security vulnerabilities that could exist within a web application, a web vulnerability scanner is a popular tool among any company that develops a web application. With the existence of many different scanners that are available to use, one is unlikely the same as the other and the results attained when evaluating these scanners in relation to each other are often not the same. READ MORE