Wireless Sensor Network

Volume 1, Issue 4 (November 2009)

ISSN Print: 1945-3078   ISSN Online: 1945-3086

Google-based Impact Factor: 1  Citations  

LDAP Injection Techniques

HTML  Download Download as PDF (Size: 1368KB)  PP. 233-244  
DOI: 10.4236/wsn.2009.14030    10,953 Downloads   18,768 Views  Citations

Affiliation(s)

.

ABSTRACT

The increase in the number of databases accessed only by some applications has made code injection attacks an important threat to almost any current system. If one of these applications accepts inputs from a client and executes these inputs without first validating them, the attackers are free to execute their own queries and therefore, to extract, modify or delete the content of the database associated to the application. In this paper a deep analysis of the LDAP injection techniques is presented. Furthermore, a clear distinction between classic and blind injection techniques is made.

Share and Cite:

J. Maria ALONSO, A. GUZMAN, M. BELTRAN and R. BORDON, "LDAP Injection Techniques," Wireless Sensor Network, Vol. 1 No. 4, 2009, pp. 233-244. doi: 10.4236/wsn.2009.14030.

Cited by

[1] Deceptive directories and “vulnerable” logs: a honeypot study of the LDAP and log4j attack landscape
… EuroS&P Workshop on …, 2022
[2] On prototype pollution and security risks of developing with third-party software components
2022
[3] Developing a Framework for Automated Penetration Testing with Remediation
2021
[4] DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU)
2021
[5] Injection Attacks Reloaded: Tunnelling Malicious Payloads over {DNS}
30th USENIX Security Symposium (USENIX …, 2021
[6] Security Analysis of DDoS Attacks Using Machine Learning Algorithms in Networks Traffic
Electronics, 2021
[7] Comparación de algoritmos de búsqueda binarios y secuenciales para evaluar el riesgo de inyecciones SQL inferenciales en aplicaciones web
2020
[8] Un système de détection d'intrusion pour la cybersécurité
2020
[9] Detection of DDoS Attack in TCP protocol using Hybrid Machine Learning Techniques
2020
[10] Network Intrusion Detection for Distributed Denial-of-Service (DDoS) Attacks using Machine Learning Classification Techniques
2020
[11] Central autentisering för ett inbyggt system.
2018
[12] Lecture Notes in Computer Science: JAX-RS security against code injection attacks
2017
[13] Detection of vulnerabilities and automatic protection for web applications
2016
[14] Secure Single Sign-On
2015
[15] Detecting LDAP Misuse in a Distributed Big Data Environment
ProQuest Dissertations Publishing, 2014
[16] METODOLOGIA DE CONFIGURAÇÃO DE VULNERABILIDADES PARA O MODSECURITY
2013
[17] A taxonomy and survey of attacks on digital signatures
Computers & Security, 2013
[18] Validation DSL for client-server applications
2012
[19] Verifying authenticity of an attribute value signature
2011/10/25/
[20] LDAP grouping for digital signature creation
2011/02/22/
[21] DATABASE SECURITY FLAWS IN GIANT WEB BASED SYSTEMS AND SYSTEMATIC APPROACH
2011
[22] Vulnerabilities of LDAP as an Authentication Service
Journal of Information Security, 2011
[23] Security Implications of Insecure DNS Usage in the Internet

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.