LDAP Injection Techniques

HTML  Download Download as PDF (Size: 1368KB)  PP. 233-244  
DOI: 10.4236/wsn.2009.14030    10,953 Downloads   18,767 Views  Citations

Affiliation(s)

.

ABSTRACT

The increase in the number of databases accessed only by some applications has made code injection attacks an important threat to almost any current system. If one of these applications accepts inputs from a client and executes these inputs without first validating them, the attackers are free to execute their own queries and therefore, to extract, modify or delete the content of the database associated to the application. In this paper a deep analysis of the LDAP injection techniques is presented. Furthermore, a clear distinction between classic and blind injection techniques is made.

Share and Cite:

J. Maria ALONSO, A. GUZMAN, M. BELTRAN and R. BORDON, "LDAP Injection Techniques," Wireless Sensor Network, Vol. 1 No. 4, 2009, pp. 233-244. doi: 10.4236/wsn.2009.14030.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.