Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks

Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large num...

Full description

Bibliographic Details
Main Authors: Ying-Chiang Cho, Jen-Yi Pan
Format: Article
Language:English
Published: Hindawi Limited 2013-01-01
Series:The Scientific World Journal
Online Access:http://dx.doi.org/10.1155/2013/946768
id doaj-e47578d63896451d8ea55dd4c38282bc
record_format Article
spelling doaj-e47578d63896451d8ea55dd4c38282bc2020-11-24T21:26:37ZengHindawi LimitedThe Scientific World Journal1537-744X2013-01-01201310.1155/2013/946768946768Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level AttacksYing-Chiang Cho0Jen-Yi Pan1Department of Electrical Engineering, National Chung Cheng University, Chia-Yi 62102, TaiwanDepartment of Electrical Engineering, National Chung Cheng University, Chia-Yi 62102, TaiwanGiven the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.http://dx.doi.org/10.1155/2013/946768
collection DOAJ
language English
format Article
sources DOAJ
author Ying-Chiang Cho
Jen-Yi Pan
spellingShingle Ying-Chiang Cho
Jen-Yi Pan
Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks
The Scientific World Journal
author_facet Ying-Chiang Cho
Jen-Yi Pan
author_sort Ying-Chiang Cho
title Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks
title_short Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks
title_full Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks
title_fullStr Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks
title_full_unstemmed Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks
title_sort vulnerability assessment of ipv6 websites to sql injection and other application level attacks
publisher Hindawi Limited
series The Scientific World Journal
issn 1537-744X
publishDate 2013-01-01
description Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.
url http://dx.doi.org/10.1155/2013/946768
work_keys_str_mv AT yingchiangcho vulnerabilityassessmentofipv6websitestosqlinjectionandotherapplicationlevelattacks
AT jenyipan vulnerabilityassessmentofipv6websitestosqlinjectionandotherapplicationlevelattacks
_version_ 1725978525840703488