Please use this identifier to cite or link to this item:
Title: Post Connection Attacks in MySQL
Authors: Kaya, Ahmet Selim
Selçuk, Ali Aydın
Keywords: MySQL attacks
post-connection attacks
user defined feature library
reverse shell connection
system takeover
Issue Date: 2020
Publisher: IEEE
Source: 5th International Conference on Computer Science and Engineering (UBMK) -- SEP 09-11, 2020 -- Diyarbakir, TURKEY
Abstract: This article covers the default security features of MySQL, a very popular open-source database management system, and what types of attacks an attacker can perform after successfully connecting to a database. In this context, it introduces Zephyr, a platform we developed, which automatically performs the types of scanning and attacks caused by incorrect or incomplete security configurations. We demonstrate an analysis of the security of MySQL usage in Turkey over Zephyr.
ISBN: 978-1-7281-7565-2
Appears in Collections:Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection

Show full item record

CORE Recommender

Page view(s)

checked on Dec 26, 2022

Google ScholarTM



Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.