SQLi Penetration Testing of Financial Web Applications: Investigation of Bangladesh Region

被引:0
作者
Farah, Tanjila [1 ]
Alain, Delwar [2 ]
Kabir, Alamgir [2 ]
Bhuiyan, Touhid [2 ]
机构
[1] North South Univ, Dept ECE, Dhaka, Bangladesh
[2] Daffodil Int Univ, Dept Software Engn, Dhaka, Bangladesh
来源
2015 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS) | 2015年
关键词
Financial web application; penetration testing; black box testing; SQLi;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Business critical web applications are the most popular services provided to the client by the financial sector. These applications are bringing handsome revenue for the financial industry every year. These services are also a frequent target of attackers. Poor coding practice leads applications to vulnerability that are exploited by attackers. Information and privileges such as access to databases, admin authorization, and access to data could be retrieved through exploitation. Services provided through web applications make the exploitation easier as these could be accessed from anywhere around the world. Web based financial services are comparatively new concept in Bangladesh. Thus the security aspects of these applications are less explored. This paper represents an analysis of few basic security issues of the financial web applications of Bangladesh. It focuses on structured query language injection (SQLi) vulnerability. It presents a manual black box penetration testing approach to test the financial web applications. Same steps are used for testing all the web applications in the dataset. A vulnerability analysis of the findings collected during the penetration testing is also presented in the paper.
引用
收藏
页码:146 / 151
页数:6
相关论文
共 12 条
  • [1] [Anonymous], 2002, COMPLETE WEB APPL SE
  • [2] Haubris K. P., 2013, 10 INT C INF TECHN N
  • [3] Huang Y.-W., 2003, Proceedings of the 12th international conference on World Wide Web, P148
  • [4] Mainka Christian, 2012, 2012 IEEE Eighth World Congress on Services, P163, DOI 10.1109/SERVICES.2012.7
  • [5] Mirjalili M., 2014, INT J ADV COMPUTER S, V3
  • [6] Mittal P., 2008, NIST PUBLICATION
  • [7] Olson O., 2010, INFORM SECURITY READ
  • [8] Pan W., 2009, IEEE INT C MAN E COM, P499
  • [9] Web Application Intrusion Detection System for Input Validation Attack
    Park, YongJoon
    Park, JaeChul
    [J]. THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 498 - 504
  • [10] Razzaq A., 2013, 11 IEEE INT S AUT DE, P35