To search, Click below search items.

 

All Published Papers Search Service

Title

Using SQLMAP to Detect SQLI Vulnerabilities

Author

Waad Almadhy, Amal Alruwaili, and Saloua Hendaoui

Citation

Vol. 22  No. 1  pp. 234-240

Abstract

One of the most discussed topics is cyber security when it comes to web application and how to protect it and protect databases. One of the most widely used and widespread techniques is SQLI, and it is used by hackers and hackers. In this research, we touched on the concept of SQLI and what are its different types, and then we detected a SQLI vulnerability in a website using SQLMAP. Finally, we mentioned different ways to avoid and protect against SQLI.

Keywords

cybersecurity, SQLMAP, SQLI, Vulnerability, Web Application Attacks.

URL

http://paper.ijcsns.org/07_book/202201/20220132.pdf