• Ei tuloksia

From a Vulnerability Search to a Criminal Case : Script Analysis of an SQL Injection Attack

N/A
N/A
Info
Lataa
Protected

Academic year: 2022

Jaa "From a Vulnerability Search to a Criminal Case : Script Analysis of an SQL Injection Attack"

Copied!
19
0
0

Kokoteksti

(1)

© 2020 International Journal of Cyber Criminology (Diamond Open Access Journal). Under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License

63

Copyright © 2020 International Journal of Cyber Criminology – ISSN: 0974–2891 January – June 2020. Vol. 14(1): 63–80. DOI: 10.5281/zenodo.3740361

Publisher & Editor-in-Chief – K. Jaishankar

/

Open Access (Authors / Readers No Pay Journal).

This is a Diamond Open Access article distributed under the terms of the

Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International

(CC-BY-NC-SA 4.0) License, which permits unrestricted non-commercial use,

distribution, and reproduction in any medium, provided the original work is

properly cited.

(2)

Leppänen et al – From a Vulnerability Search to a Criminal Case: Script Analysis of an SQL Injection Attack

© 2020 International Journal of Cyber Criminology (Diamond Open Access Journal). Under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License

64

(3)

© 2020 International Journal of Cyber Criminology (Diamond Open Access Journal). Under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License

65

̶ ̶

(4)

Leppänen et al – From a Vulnerability Search to a Criminal Case: Script Analysis of an SQL Injection Attack

© 2020 International Journal of Cyber Criminology (Diamond Open Access Journal). Under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License

66

(5)

© 2020 International Journal of Cyber Criminology (Diamond Open Access Journal). Under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License

67

(6)

Leppänen et al – From a Vulnerability Search to a Criminal Case: Script Analysis of an SQL Injection Attack

© 2020 International Journal of Cyber Criminology (Diamond Open Access Journal). Under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License

68

(7)

© 2020 International Journal of Cyber Criminology (Diamond Open Access Journal). Under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License

69

(8)

Leppänen et al – From a Vulnerability Search to a Criminal Case: Script Analysis of an SQL Injection Attack

© 2020 International Journal of Cyber Criminology (Diamond Open Access Journal). Under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License

70

(9)

© 2020 International Journal of Cyber Criminology (Diamond Open Access Journal). Under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License

71

(10)

Leppänen et al – From a Vulnerability Search to a Criminal Case: Script Analysis of an SQL Injection Attack

© 2020 International Journal of Cyber Criminology (Diamond Open Access Journal). Under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License

72

(11)

© 2020 International Journal of Cyber Criminology (Diamond Open Access Journal). Under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License

73

(12)

Leppänen et al – From a Vulnerability Search to a Criminal Case: Script Analysis of an SQL Injection Attack

© 2020 International Journal of Cyber Criminology (Diamond Open Access Journal). Under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License

74

(13)

© 2020 International Journal of Cyber Criminology (Diamond Open Access Journal). Under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License

75

(14)

Leppänen et al – From a Vulnerability Search to a Criminal Case: Script Analysis of an SQL Injection Attack

© 2020 International Journal of Cyber Criminology (Diamond Open Access Journal). Under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License

76

(15)

© 2020 International Journal of Cyber Criminology (Diamond Open Access Journal). Under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License

77

(16)

Leppänen et al – From a Vulnerability Search to a Criminal Case: Script Analysis of an SQL Injection Attack

© 2020 International Journal of Cyber Criminology (Diamond Open Access Journal). Under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License

78

(17)

© 2020 International Journal of Cyber Criminology (Diamond Open Access Journal). Under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License

79

(18)

Leppänen et al – From a Vulnerability Search to a Criminal Case: Script Analysis of an SQL Injection Attack

© 2020 International Journal of Cyber Criminology (Diamond Open Access Journal). Under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License

80

(19)

© 2020. This work is published under

https://creativecommons.org/licenses/by-nc-sa/4.0/(the “License”).

Notwithstanding the ProQuest Terms and Conditions, you may use this content

in accordance with the terms of the License.

Viittaukset

LIITTYVÄT TIEDOSTOT

Rajattujen viestien joukossa olevat kuvat (611 kpl) käytiin lisäksi läpi selailuperiaatteella, kuten myös powerpoint-esitykset (330 kpl). Samasta viestistä oli

Nearly 50 primary-school pupils from Sweden and Belarus participated in educational programmes at Skansen and the Belarusian State Museum of Folk Architecture and

Artikkelissa siteeratuissa tekstikatkelmissa sekä kirjoittajien että teksteissä mainittujen henkilöiden nimet on jätetty mainitsematta tai vaihdettu, ellei nimiä ole ilmoitettu

”Legendan mukaan svealaisten kuningas vei tapetun suomalaiskuninkaan tyttären Uppsalaan sotasaaliina, mutta prinsessa kuristi kuninkaan, ja pakeni kotimaahansa, ja

Learning Design Toolkit, by ​Akseli Huhtanen​, Aalto University, is licensed under Creative Commons Attribution 4.0 International​ license.... MIKSI TÄMÄ AIHE ON RELEVANTTI

This Photo by Unknown Author is licensed under CC BY-SA-NC This Photo by Unknown Author is licensed under CC BY-NC This Photo by Unknown Author is licensed under CC

awkward to assume that meanings are separable and countable.ra And if we accept the view that semantics does not exist as concrete values or cognitively stored

At this point in time, when WHO was not ready to declare the current situation a Public Health Emergency of In- ternational Concern,12 the European Centre for Disease Prevention