Abstract

Web-based application attacks are growing dramatically in number and severity. They found that web applications that are poorly validated and verified are susceptible to attacks by the attacker. network related SQL attacks. The MD5 (message digest algorithm) hashing method is a one-way cryptographic function that accepts any text field as input and produces a fixed-length digest value that may be used to identify the original message as output. Most security experts advise replacing the MD hash algorithm with a much more secure message digest. ”Because of these collisions, a hacker or malicious user may construct files with almost the same exact hash as another, making it difficult to be certain that the file has not been interfered with. As a result, it should not be utilised for anything. Developers should instead use a Solid Cryptographic Hash function or a Symmetric Cryptographic Algorithm. this research paper demonstrates how md5 function in php can be bypassed when its parameter is set to ”TRUE” ie.,[ md5( ’x’, TRUE)], this makes the hashing value(x) to be raw bytes than hexa-coded value which is much more easier to inject a SQL Statement and retrieve the original String. The above is demonstrated using SQL Fiddle in which a sample php code value fields are hashed and when its md5() is set to TRUE ,how SQLI bypasses md5().The best approach for solving above problem is to use symmetric hash function like Sha1() , sha2(),CRC which does multiple layer of hashing and when using md5() not to set its parameter to” TRUE”.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.