Redirigiendo al acceso original de articulo en 16 segundos...
ARTÍCULO
TITULO

Vulnerability analysis with SQLMAP applied to APEX 5 environments

Esteban Crespo-Martinez    

Resumen

Databases are usually the main targets of an attack, specifically for the information that they store, since, according to Druker, information is power. In this work vulnerability tests are performed of the database of an ERP software developed in APEX 5. For this purpose, FOSS tools are used to test and analyze vulnerabilities of databases, identifying that sessions used by ERP based on Oracle APEX are carried out randomly, and besides are generated again at particular times. It is therefore concluded that, with the tests applied and the updates of SQLMAP to the date of the experiment, it has not been possible to vulnerate the ERP software with SQL injection techniques.

 Artículos similares

       
 
Dipayan Mazumder, Mithun Datta, Alexander C. Bodoh and Ashiq A. Sakib    
The increasing demand for high-speed, energy-efficient, and miniaturized electronics has led to significant challenges and compromises in the domain of conventional clock-based digital designs, most notably reduced circuit reliability, particularly in mi... ver más

 
Jialong Peng, Shaoqiang Wang, Lin Mu and Si Wang    
With the increasing global reliance on maritime oil transportation, oil spills pose significant environmental hazards to coastal ecosystems. This study presents a comprehensive quantitative framework for assessing oil spill risks along the Jiaozhou Bay c... ver más
Revista: Water

 
Abdul Basit, Safeer Abbas, Muhammad Mubashir Ajmal, Ubaid Ahmad Mughal, Syed Minhaj Saleem Kazmi and Muhammad Junaid Munir    
This study undertakes a comprehensive experimental and numerical analysis of the structural integrity of buried RC sewerage pipes, focusing on the performance of two distinct jointing materials: cement mortar and non-shrinkage grout. Through joint shear ... ver más
Revista: Infrastructures

 
Ioana Branescu, Octavian Grigorescu and Mihai Dascalu    
Effectively understanding and categorizing vulnerabilities is vital in the ever-evolving cybersecurity landscape, since only one exposure can have a devastating effect on the entire system. Given the increasingly massive number of threats and the size of... ver más
Revista: Information

 
Moatsum Alawida, Bayan Abu Shawar, Oludare Isaac Abiodun, Abid Mehmood, Abiodun Esther Omolara and Ahmad K. Al Hwaitat    
The Chat Generative Pre-training Transformer (GPT), also known as ChatGPT, is a powerful generative AI model that can simulate human-like dialogues across a variety of domains. However, this popularity has attracted the attention of malicious actors who ... ver más
Revista: Information