2008 11th IEEE Singapore International Conference on Communication Systems 2008
DOI: 10.1109/iccs.2008.4737330
|View full text |Cite
|
Sign up to set email alerts
|

LDAP injection techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 10 publications
0
9
0
Order By: Relevance
“…LDAP LDAP injection is an attack utilized to achieve web-based applications that structure LDAP declarations based on client information [40]. NETBIOS A security flaw in NetBIOS permits an attacker to read data [41].…”
Section: Ssdpmentioning
confidence: 99%
“…LDAP LDAP injection is an attack utilized to achieve web-based applications that structure LDAP declarations based on client information [40]. NETBIOS A security flaw in NetBIOS permits an attacker to read data [41].…”
Section: Ssdpmentioning
confidence: 99%
“…LDAP directories are hierarchical databases [1] that hold information about people and entities [3] (such as workstation PAM or SAM files). Inside each directory, data is stored in a tree structure with every level of the tree being a different domain.…”
Section: Ldap Overviewmentioning
confidence: 99%
“…This means that by design LDAP is an open system for accepting and returning queries. The difference between directories and regular databases is that a directory typically has its data organized to allow quick search results for rapid querying [4].…”
Section: Ldap Overviewmentioning
confidence: 99%
See 2 more Smart Citations