CN103441985B - A kind of SQL injection loophole detection method for COOKIE mode - Google Patents
A kind of SQL injection loophole detection method for COOKIE mode Download PDFInfo
- Publication number
- CN103441985B CN103441985B CN201310317265.XA CN201310317265A CN103441985B CN 103441985 B CN103441985 B CN 103441985B CN 201310317265 A CN201310317265 A CN 201310317265A CN 103441985 B CN103441985 B CN 103441985B
- Authority
- CN
- China
- Prior art keywords
- cookie
- statement
- sql
- sql injection
- cookie value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 235000014510 cooky Nutrition 0.000 title claims abstract description 91
- 238000002347 injection Methods 0.000 title claims abstract description 50
- 239000007924 injection Substances 0.000 title claims abstract description 50
- 238000001514 detection method Methods 0.000 title claims abstract description 11
- 238000000034 method Methods 0.000 claims description 13
- 230000015572 biosynthetic process Effects 0.000 claims description 3
- 238000001914 filtration Methods 0.000 claims description 3
- 230000008569 process Effects 0.000 claims description 3
- 230000006870 function Effects 0.000 description 7
- 230000008859 change Effects 0.000 description 2
- 206010029412 Nightmare Diseases 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008260 defense mechanism Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
Landscapes
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310317265.XA CN103441985B (en) | 2013-07-25 | 2013-07-25 | A kind of SQL injection loophole detection method for COOKIE mode |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310317265.XA CN103441985B (en) | 2013-07-25 | 2013-07-25 | A kind of SQL injection loophole detection method for COOKIE mode |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103441985A CN103441985A (en) | 2013-12-11 |
CN103441985B true CN103441985B (en) | 2016-09-21 |
Family
ID=49695650
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310317265.XA Active CN103441985B (en) | 2013-07-25 | 2013-07-25 | A kind of SQL injection loophole detection method for COOKIE mode |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103441985B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109150842B (en) * | 2018-07-25 | 2021-07-09 | 平安科技(深圳)有限公司 | Injection vulnerability detection method and device |
CN109120603B (en) * | 2018-07-25 | 2021-05-18 | 平安科技(深圳)有限公司 | Injection vulnerability detection method and device |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101459548A (en) * | 2007-12-14 | 2009-06-17 | 北京启明星辰信息技术股份有限公司 | Script injection attack detection method and system |
-
2013
- 2013-07-25 CN CN201310317265.XA patent/CN103441985B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101459548A (en) * | 2007-12-14 | 2009-06-17 | 北京启明星辰信息技术股份有限公司 | Script injection attack detection method and system |
Non-Patent Citations (1)
Title |
---|
web攻防系列教程之cookie注入攻防实战;北京瑞星信息技术有限公司;《瑞星安全月刊》;20120823;第2页第5行至第15行 * |
Also Published As
Publication number | Publication date |
---|---|
CN103441985A (en) | 2013-12-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102185930B (en) | Method for detecting SQL (structured query language) injection vulnerability | |
Buehrer et al. | Using parse tree validation to prevent SQL injection attacks | |
Jang et al. | Detecting SQL injection attacks using query result size | |
Ciampa et al. | A heuristic-based approach for detecting SQL-injection vulnerabilities in Web applications | |
Tajpour et al. | SQL injection detection and prevention tools assessment | |
Nagpal et al. | A survey on the detection of SQL injection attacks and their countermeasures | |
Yeole et al. | Analysis of different technique for detection of SQL injection | |
Hou et al. | MongoDB NoSQL injection analysis and detection | |
Dalai et al. | Neutralizing SQL injection attack using server side code modification in web applications | |
US10073844B1 (en) | Accelerated system and method for providing data correction | |
Kausar et al. | SQL injection detection and prevention techniques in ASP .NET web application | |
Yulianto et al. | Mitigation of cryptojacking attacks using taint analysis | |
CN103441985B (en) | A kind of SQL injection loophole detection method for COOKIE mode | |
Garn et al. | Combinatorial methods for dynamic gray‐box SQL injection testing | |
Hu | Research on the technology of detecting the SQL injection attack and non-intrusive prevention in WEB system | |
Manmadhan et al. | A method of detecting sql injection attack to secure web applications | |
CN104715018A (en) | Intelligent SQL injection resistant method based on semantic analysis | |
Chaki et al. | A Survey on SQL Injection Prevention Methods | |
Mamadhan et al. | SQLStor: Blockage of stored procedure SQL injection attack using dynamic query structure validation | |
Gonzalez et al. | Database SQL injection security problem handling with examples | |
Gupta et al. | Analysis of NoSQL database vulnerabilities | |
Srivastava et al. | Verity: Blockchains to detect insider attacks in DBMS | |
Medhane | Efficient solution for SQL injection attack detection and prevention | |
Sharma et al. | Explorative study of SQL injection attacks and mechanisms to secure web application database-A | |
Shegokar et al. | A survey on SQL injection attack, detection and prevention techniques |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C41 | Transfer of patent application or patent right or utility model | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20160425 Address after: 100031 Xicheng District West Chang'an Avenue, No. 86, Beijing Applicant after: State Grid Corporation of China Applicant after: China Electric Power Research Institute Applicant after: State Grid Smart Grid Institute Address before: 100031 Xicheng District West Chang'an Avenue, No. 86, Beijing Applicant before: State Grid Corporation of China Applicant before: China Electric Power Research Institute |
|
CB02 | Change of applicant information |
Address after: 100031 Xicheng District West Chang'an Avenue, No. 86, Beijing Applicant after: State Grid Corporation of China Applicant after: China Electric Power Research Institute Applicant after: GLOBAL ENERGY INTERCONNECTION RESEARCH INSTITUTE Address before: 100031 Xicheng District West Chang'an Avenue, No. 86, Beijing Applicant before: State Grid Corporation of China Applicant before: China Electric Power Research Institute Applicant before: State Grid Smart Grid Institute |
|
COR | Change of bibliographic data | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |