Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.11851/7293
Title: | Post Connection Attacks in MySQL | Authors: | Kaya, Ahmet Selim Selçuk, Ali Aydın |
Keywords: | MySQL attacks post-connection attacks Shodan user defined feature library reverse shell connection system takeover |
Publisher: | IEEE | Source: | 5th International Conference on Computer Science and Engineering (UBMK) -- SEP 09-11, 2020 -- Diyarbakir, TURKEY | Abstract: | This article covers the default security features of MySQL, a very popular open-source database management system, and what types of attacks an attacker can perform after successfully connecting to a database. In this context, it introduces Zephyr, a platform we developed, which automatically performs the types of scanning and attacks caused by incorrect or incomplete security configurations. We demonstrate an analysis of the security of MySQL usage in Turkey over Zephyr. | URI: | https://hdl.handle.net/20.500.11851/7293 | ISBN: | 978-1-7281-7565-2 |
Appears in Collections: | Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection |
Show full item record
CORE Recommender
WEB OF SCIENCETM
Citations
1
checked on Nov 2, 2024
Page view(s)
58
checked on Nov 11, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.