SQL Assign
SQL Assign
1. Introduction 3
2. Server-side technologies 4
2.2. MySQL 4
4. Future enhancement 7
6. References 9
DIM18457528
1. Introduction
Defined as a program that is installed on a remote web server, web
applications are delivered over the Internet and respond to requests from the HTTP
protocol. Because web developers are not very well connected to security issues, a
gap is created for vulnerability. The weakness existing in the system, which allows
the intruder to access the data or to obtain complete control of an application is
deficient by the vulnerability. Following the research in the first part of the
assessment, I will discuss SQL injection, exposure of sensitive data, use of
components with a known vulnerability. Currently, a wide range of scripting
languages and technologies are also available for processing and server integration.
At the same time, technologies have their advantages and disadvantages, which
makes it difficult to choose a suitable server environment for developers in
developing their projects.
2
DIM18457528
2.2. MySQL
MySQL is a fast-relational database system (RDBMS), fast, easy to use for
large and small companies, being launched under an open-source license. MySQL
3
DIM18457528
holds large databases, up to 50 million rows, and maybe even custom, which
enables programmers to adjust the software to suit their demands.
been classified into three broad categories: Technical Vulnerabilities (60%), Security
Vulnerabilities (25%), and Configuration Vulnerabilities (15%).
5
DIM18457528
6
DIM18457528
4. Future enhancement
4.1. Critical discussion on used tools
During the first parts of the assessment we have been used different tools and
methods, as Nmap scanning, Wireshark Sniffing and SQL Injection using SQLMAP.
Those Web Application Security testing is open-source software and helped to
detect the vulnerability of the web site from the giving scenario. Nmap scanning is
one of the oldest protection tools in presence (released in 1997) which identify open
ports on remote host and discover vulnerabilities inside the network. Wireshark
allows us to analyze network traffic in actual time and is recognized for its capability
to identify security problems in any network, and last but not least its ability to solve
general network problems. Being a penetration testing tool SQL Map automates the
detection process, providing support for enumerating users, privileges, password
hashes, databases, tables and columns.
port scanning and host discovery of large and medium networks. Another alternative
is Wapiti, which is based on the command line written in Python, even if it is not the
popular instrument in this area, it easily finds security imperfections in various web
applications such as SQL injections, XSS attacks, fake application and others.
8
DIM18457528
6. References
Almin, S. B. (n.d.). Web Server Security and Survey on Web Application Security. (I. J.
Communication, Ed.) Retrieved 03 2020, from academia.edu:
https://www.academia.edu/7197737/Web_Server_Security_and_Survey_on_Web_A
pplication_Security
TEAM, S. (Ed.). (2018). Top 15 Ethical Hacking Tools Used by Infosec Professionals.
Retrieved 03 2020, from https://securitytrails.com/: https://securitytrails.com/blog/top-
15-ethical-hacking-tools-used-by-infosec-professionals
Vincent Appiah, M. A.-B. (2018). Survey of Websites and Web Application Security Threats
Using Vulnerability Assessment. Science Publications, Journal of Computer Science.
Retrieved 03 20, 2020, from
https://www.researchgate.net/publication/338022001_Survey_of_Websites_and_We
b_Application_Security_Threats_Using_Vulnerability_Assessment/link/
5e0b3f4c4585159aa4a715a6/download
Web Aplication Security. (n.d.). Retrieved 2020, from Roehampton Partnerships Moodle:
https://partnerships.moodle.roehampton.ac.uk/course/view.php?id=813