Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks
Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large num...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2013-01-01
|
Series: | The Scientific World Journal |
Online Access: | http://dx.doi.org/10.1155/2013/946768 |
id |
doaj-e47578d63896451d8ea55dd4c38282bc |
---|---|
record_format |
Article |
spelling |
doaj-e47578d63896451d8ea55dd4c38282bc2020-11-24T21:26:37ZengHindawi LimitedThe Scientific World Journal1537-744X2013-01-01201310.1155/2013/946768946768Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level AttacksYing-Chiang Cho0Jen-Yi Pan1Department of Electrical Engineering, National Chung Cheng University, Chia-Yi 62102, TaiwanDepartment of Electrical Engineering, National Chung Cheng University, Chia-Yi 62102, TaiwanGiven the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.http://dx.doi.org/10.1155/2013/946768 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Ying-Chiang Cho Jen-Yi Pan |
spellingShingle |
Ying-Chiang Cho Jen-Yi Pan Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks The Scientific World Journal |
author_facet |
Ying-Chiang Cho Jen-Yi Pan |
author_sort |
Ying-Chiang Cho |
title |
Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks |
title_short |
Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks |
title_full |
Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks |
title_fullStr |
Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks |
title_full_unstemmed |
Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks |
title_sort |
vulnerability assessment of ipv6 websites to sql injection and other application level attacks |
publisher |
Hindawi Limited |
series |
The Scientific World Journal |
issn |
1537-744X |
publishDate |
2013-01-01 |
description |
Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out. |
url |
http://dx.doi.org/10.1155/2013/946768 |
work_keys_str_mv |
AT yingchiangcho vulnerabilityassessmentofipv6websitestosqlinjectionandotherapplicationlevelattacks AT jenyipan vulnerabilityassessmentofipv6websitestosqlinjectionandotherapplicationlevelattacks |
_version_ |
1725978525840703488 |