LDAP injection techniques

@article{Alonso2008LDAPIT,
  title={LDAP injection techniques},
  author={Jose Maria Alonso and Antonio Guzm{\'a}n and Marta Beltr{\'a}n and Rodolfo Bordon},
  journal={2008 11th IEEE Singapore International Conference on Communication Systems},
  year={2008},
  pages={980-986}
}
The increase in the number of databases accessed only by some applications has made code injection attacks an important threat to almost any current system. If one of these applications accepts inputs from a client and executes these inputs without first validating them, the attackers are free to execute their own queries and therefore, to extract, modify or delete the content of the database associated to the application. In this paper a deep analysis of the LDAP injection techniques is… CONTINUE READING