I
nd
o
ne
s
ia
n J
o
urna
l o
f
E
lect
rica
l En
g
ineering
a
nd
Co
m
p
u
t
er
Science
Vo
l.
12
,
No
.
2
,
N
o
v
e
m
b
er
201
8
,
p
p
.
7
2
9
~
7
3
7
I
SS
N:
2
5
0
2
-
4
7
5
2
,
DOI
: 1
0
.
1
1
5
9
1
/i
j
ee
cs.v
1
2
.i
2
.
p
p
729
-
7
3
7
729
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ia
e
s
co
r
e.
co
m/jo
u
r
n
a
ls
/in
d
ex
.
p
h
p
/
ijeec
s
Penetra
tion Tes
ti
ng
using
K
a
li Lin
ux
:
SQ
L In
ject
io
n
,
XSS,
Wo
rd
pres, an
d WP
A2
At
tac
k
s
T
eddy
Su
ry
a
G
un
a
w
a
n
1
,
M
uh
a
mm
a
d K
a
s
i
m
L
i
m
2
,
M
ira
K
a
rt
iw
i
3
,
No
re
ha
Abdu
l M
a
lik
4
,
Na
na
ng
I
s
m
a
il
5
1
,
2,
4
El
e
c
tri
c
a
l
a
n
d
Co
m
p
u
ter E
n
g
in
e
e
rin
g
De
p
a
rtm
e
n
t,
In
tern
a
ti
o
n
a
l
Isla
m
i
c
Un
iv
e
rsit
y
M
a
la
y
si
a
,
M
a
la
y
sia
3
In
f
o
rm
a
ti
o
n
S
y
ste
m
s De
p
a
rt
m
e
n
t,
In
ter
n
a
ti
o
n
a
l
Isla
m
ic Un
iv
e
rsit
y
M
a
lay
sia
5
3
1
0
0
Ja
lan
G
o
m
b
a
k
,
Ku
a
la
L
u
m
p
u
r,
M
a
lay
sia
5
El
e
c
tri
c
a
l
En
g
in
e
e
rin
g
De
p
a
rtm
e
n
t,
F
a
c
u
lt
y
o
f
S
c
ien
c
e
a
n
d
T
e
c
h
n
o
lo
g
y
,
UIN
S
u
n
a
n
G
u
n
u
n
g
Dja
ti
Ja
lan
A
.
H.
N
a
su
ti
o
n
1
0
5
,
Ba
n
d
u
n
g
,
In
d
o
n
e
sia
Art
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
Ma
y
2
1
,
2
0
1
8
R
ev
i
s
ed
J
u
l
2
2
,
2
0
1
8
A
cc
ep
ted
A
u
g
5
,
2
0
1
8
No
w
a
d
a
y
s,
c
o
m
p
u
ters
,
sm
a
rt
p
h
o
n
e
s,
sm
a
rt
w
a
tch
e
s,
p
rin
ters
,
p
ro
jec
to
rs,
w
a
sh
in
g
m
a
c
h
in
e
s,
f
rid
g
e
s,
a
n
d
o
th
e
r
m
o
b
i
le
d
e
v
ice
s
c
o
n
n
e
c
ted
to
In
tern
e
t
a
re
e
x
p
o
se
d
to
v
a
rio
u
s
th
re
a
ts
a
n
d
e
x
p
l
o
it
s.
Of
th
e
v
a
rio
u
s
a
tt
a
c
k
s,
S
QL
in
jec
ti
o
n
,
c
ro
ss
site
sc
rip
ti
n
g
,
Wo
rd
p
re
ss
,
a
n
d
W
P
A
2
a
tt
a
c
k
we
r
e
th
e
m
o
st
p
o
p
u
lar
se
c
u
rit
y
a
tt
a
c
k
s
a
n
d
w
il
l
b
e
f
u
rth
e
r
in
v
e
stig
a
ted
in
th
is
p
a
p
e
r.
Ka
l
i
L
in
u
x
p
ro
v
id
e
s
a
g
re
a
t
p
lat
f
o
rm
a
n
d
m
e
d
iu
m
in
lea
rn
in
g
v
a
rio
u
s
t
y
p
e
s
o
f
e
x
p
lo
it
s
a
n
d
p
e
n
e
tera
ti
o
n
tes
ti
n
g
.
A
ll
th
e
si
m
u
late
d
a
tt
a
c
k
w
il
l
b
e
c
o
n
d
u
c
ted
u
sin
g
Ka
li
L
in
u
x
in
sta
ll
e
d
o
n
v
irt
u
a
l
m
a
c
h
in
e
in
a
c
o
m
p
u
e
r
w
it
h
In
tel
Co
re
i5
a
n
d
8
G
B
R
A
M
,
w
h
il
e
th
e
v
i
c
ti
m
’
s
m
a
c
h
in
e
is
th
e
h
o
st
c
o
m
p
u
te
r
w
h
ich
ru
n
W
in
d
o
w
s
1
0
v
e
rsio
n
1
7
0
9
.
Re
su
l
ts
sh
o
w
e
d
th
a
t
th
e
a
tt
a
c
k
s
lau
n
c
h
e
d
b
o
th
o
n
w
e
b
a
n
d
f
ire
w
a
ll
w
e
re
c
o
n
d
u
c
te
d
su
c
c
e
ss
f
u
ll
y
.
K
ey
w
o
r
d
s
:
C
r
o
s
s
s
ite
s
cr
ip
tin
g
Kali
lin
u
x
SQL
i
n
j
ec
tio
n
W
o
r
d
p
r
ess
attac
k
W
P
A
2
attac
k
Co
p
y
rig
h
t
©
2
0
1
8
In
stit
u
te o
f
A
d
v
a
n
c
e
d
E
n
g
i
n
e
e
rin
g
a
n
d
S
c
ien
c
e
.
Al
l
rig
h
ts
re
se
rv
e
d
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
T
ed
d
y
S
u
r
y
a
G
u
n
a
w
an
,
E
lectr
ical
an
d
C
o
m
p
u
ter
E
n
g
i
n
ee
r
in
g
Dep
ar
t
m
e
n
t,
I
n
ter
n
atio
n
al
I
s
la
m
ic
U
n
iv
er
s
it
y
Ma
la
y
s
ia,
Ma
la
y
s
ia.
E
m
ail:
t
s
g
u
n
a
w
an
@
i
iu
m
.
ed
u
.
m
y
1.
I
NT
RO
D
UCT
I
O
N
P
en
etr
atio
n
test
i
n
g
is
a
le
g
iti
m
ate
ex
er
ci
s
e
o
f
e
x
p
lo
itin
g
a
s
y
s
te
m
w
i
th
r
ea
l
li
f
e
attac
k
e
r
s
ce
n
ar
io
in
cl
u
d
in
g
ille
g
al
ac
ce
s
s
a
n
d
th
e
p
r
ac
tice
o
f
m
alic
io
u
s
ac
ti
v
it
i
es.
T
h
e
p
r
o
ce
s
s
o
f
p
en
etr
atio
n
test
in
g
s
tar
t
s
f
r
o
m
id
en
ti
f
y
t
h
e
s
y
s
t
e
m
’
s
v
u
ln
e
r
ab
ilit
ies,
s
tag
e
a
n
ex
p
lo
ita
tio
n
,
v
u
ln
er
ab
ilit
ies
’
d
is
co
v
e
r
y
a
n
d
r
ep
o
r
tin
g
,
an
d
d
is
s
o
lv
i
n
g
th
e
v
u
l
n
er
ab
ilit
ies
th
a
t
ca
n
ca
u
s
e
h
ar
m
t
o
th
e
s
y
s
te
m
.
A
cc
o
r
d
in
g
to
[
1
]
,
th
e
p
r
o
ce
s
s
o
f
p
en
etr
atio
n
tes
tin
g
co
u
ld
ill
u
s
t
r
ate
th
e
lev
el
o
f
s
e
v
er
it
y
co
u
ld
b
e
d
o
n
e
o
n
th
e
s
y
s
te
m
d
u
r
i
n
g
th
e
r
ea
l
lif
e
a
ttack
th
u
s
h
elp
th
e
o
r
g
a
n
izatio
n
to
p
r
ev
en
t
it
b
ef
o
r
e
it
is
to
o
la
te,
as
s
h
o
w
n
i
n
Fig
u
r
e
1
.
M
o
r
eo
v
er
,
Op
en
W
e
b
A
p
p
licatio
n
Sec
u
r
it
y
P
r
o
j
ec
t
(
OW
A
SP
)
s
tated
t
h
at
t
h
er
e
ar
e
to
p
1
0
v
u
ln
er
ab
ilit
ies
w
h
ic
h
ca
n
ca
u
s
e
s
e
v
er
e
i
m
p
ac
t
to
w
eb
ap
p
licatio
n
[
1
]
,
s
u
ch
a
s
SQ
L
in
j
ec
tio
n
(
SQ
L
i)
,
cr
o
s
s
s
ite
s
cr
ip
tin
g
(
XSS),
lo
ca
l
f
ile
in
c
lu
s
io
n
(
L
FI)
,
an
d
r
e
m
o
te
f
i
le
in
cl
u
s
io
n
(
R
FI)
.
Fig
u
r
e
1
.
P
r
o
ce
s
s
o
f
P
en
etr
atio
n
T
esti
n
g
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4752
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci,
Vo
l.
12
,
No
.
2
,
No
v
e
m
b
er
2
0
1
8
:
7
2
9
–
7
3
7
730
SQL
i
n
j
ec
tio
n
i
s
o
n
e
o
f
t
h
e
m
o
s
t
s
er
io
u
s
t
h
r
ea
t
to
th
e
W
eb
ap
p
licatio
n
,
i
n
w
h
ic
h
a
n
at
t
ac
k
er
co
u
ld
g
ain
ac
ce
s
s
to
r
estricte
d
d
atab
ase
th
at
co
n
tain
s
en
s
iti
v
e
in
f
o
r
m
atio
n
[
2
]
.
B
asicall
y
,
SQ
L
i
n
j
ec
tio
n
is
an
attac
k
in
w
h
ich
i
n
w
h
ic
h
th
e
cr
a
f
ted
SQL
q
u
er
y
is
e
m
b
ed
d
ed
alo
n
g
t
h
e
u
s
er
i
n
p
u
t
i
n
s
u
ch
a
wa
y
th
a
t
tr
ick
ed
t
h
e
d
atab
ase
in
to
t
h
i
n
k
i
n
g
it
i
s
a
n
SQ
L
co
d
e
[
3
]
.
Me
an
w
h
ile,
XSS
at
tack
p
la
n
t
a
m
alic
io
u
s
J
av
aScr
ip
t
o
n
th
e
w
eb
s
er
v
er
to
e
x
p
lo
it
t
h
e
w
eb
s
er
v
er
an
d
g
ai
n
r
e
m
o
te
ac
ce
s
s
o
n
t
h
e
v
icti
m
’
s
m
ac
h
i
n
e.
I
n
[
4
]
,
d
is
tin
ct
n
u
m
b
er
s
o
f
w
a
y
ap
p
r
o
ac
h
ed
b
y
t
h
e
attac
k
er
s
li
k
e
h
ij
ac
k
i
n
g
t
h
e
s
e
s
s
io
n
,
ta
k
in
g
ad
v
a
n
tag
e
o
f
u
s
er
’
s
p
r
iv
ile
g
e
s
b
y
s
teali
n
g
d
ata,
p
o
s
tin
g
ad
s
i
n
h
id
d
en
I
F
R
A
ME
a
n
d
p
o
p
-
u
p
to
en
co
d
e
t
h
e
m
alicio
u
s
co
d
e
to
m
ai
n
tai
n
t
h
e
o
r
ig
in
ali
t
y
o
f
t
h
e
i
n
f
ec
ted
co
d
e
th
er
ef
o
r
e
it
ca
n
n
o
t
b
e
d
etec
ted
b
y
t
h
e
u
s
er
s
.
On
W
o
r
d
P
r
ess
attac
k
,
th
e
a
ttack
ai
m
s
o
n
g
at
h
er
in
g
i
n
f
o
r
m
atio
n
ab
o
u
t
th
e
u
s
er
ac
co
u
n
t
o
f
t
h
e
W
o
r
d
P
r
ess
an
d
b
r
u
te
f
o
r
ce
it
as
d
escr
ib
ed
in
[
5
]
.
T
h
e
u
s
er
n
a
m
e
ca
n
b
e
e
n
u
m
er
ated
b
y
e
x
p
lo
itin
g
t
h
e
W
o
r
d
Pre
s
s
d
atab
ase.
On
t
h
e
W
P
A
2
attac
k
,
W
P
A
2
is
t
h
e
m
o
s
t
s
ec
u
r
ed
n
et
w
o
r
k
p
r
o
to
co
l
b
ec
au
s
e
o
f
u
s
a
g
e
o
f
f
o
u
r
w
a
y
s
h
an
d
s
h
a
k
es.
Ne
v
er
th
ele
s
s
,
th
e
h
a
n
d
s
h
ak
e
s
ca
n
be
m
a
n
ip
u
lated
to
o
b
tain
th
e
MA
C
h
ar
d
w
ar
e
ad
d
r
ess
an
d
cr
ac
k
th
e
p
as
s
w
o
r
d
[
6
]
.
A
lt
h
o
u
g
h
m
an
y
attac
k
s
h
a
v
e
b
ee
n
d
e
m
o
n
s
tr
ated
in
t
h
e
liter
at
u
r
e,
h
o
w
ev
er
i
n
t
h
is
p
ap
er
w
e
w
il
l f
o
c
u
s
o
n
th
e
to
p
f
o
u
r
p
en
etr
atio
n
,
s
u
ch
as
S
Q
L
i,
XSS,
W
o
r
d
p
r
ess
,
an
d
W
P
A
2
attac
k
s
u
s
i
n
g
Ka
li
L
i
n
u
x
.
Kali
L
in
u
x
is
a
p
en
etr
atio
n
te
s
ti
n
g
a
n
d
s
e
cu
r
it
y
a
u
d
iti
n
g
p
lat
f
o
r
m
w
i
th
ad
v
an
ce
d
to
o
ls
to
id
en
ti
f
y
,
d
et
ec
t,
an
d
ex
p
lo
it
an
y
v
u
l
n
er
ab
ilit
ie
s
u
n
co
v
er
ed
in
t
h
e
tar
g
et
n
et
w
o
r
k
en
v
ir
o
n
m
e
n
t
[7
]
,
[
8]
.
A
d
d
itio
n
al
to
o
ls
a
ls
o
ca
n
b
e
ad
d
ed
to
Kali
L
i
n
u
x
i
f
r
eq
u
ir
ed
.
Kali
L
in
u
x
co
v
er
s
t
h
e
w
h
o
le
p
r
o
ce
s
s
o
f
lau
n
c
h
in
g
t
h
e
attac
k
:
f
r
o
m
g
at
h
er
in
g
in
f
o
r
m
atio
n
ab
o
u
t
th
e
tar
g
et,
d
eter
m
in
i
n
g
t
h
e
v
u
ln
er
ab
ilit
y
to
attac
k
an
d
r
ep
o
r
t
th
e
f
in
d
i
n
g
[
6
]
.
T
h
e
r
ev
ie
w
an
d
s
etu
p
o
f
Ka
li
L
in
u
x
h
as b
e
en
p
r
esen
ted
in
[
9
]
.
2.
P
E
NE
T
RA
T
I
O
N
T
E
ST
I
N
G
DE
S
I
G
N
AND
I
M
P
L
E
M
E
NT
AT
I
O
N
SQL
p
la
y
s
a
s
i
g
n
i
f
ican
t
r
o
le
in
t
h
e
R
elatio
n
Data
b
ase
Ma
n
ag
e
m
e
n
t
S
y
s
te
m
(
R
DB
MS)
d
u
e
to
it
s
s
i
m
p
lic
it
y
a
n
d
s
tr
ai
g
h
tf
o
r
w
ar
d
n
es
s
[
1
0
]
.
SQL
i
n
j
ec
tio
n
o
cc
u
r
s
w
h
e
n
an
a
ttack
er
i
n
j
ec
ts
t
h
e
SQL
q
u
er
ies
w
i
t
h
n
e
w
p
ar
a
m
eter
s
i
n
to
th
e
in
p
u
t
v
al
u
es
to
en
ter
a
n
d
g
a
in
ac
ce
s
s
to
t
h
e
d
atab
ase
u
n
a
u
t
h
o
r
ized
l
y
.
T
h
e
attac
k
o
cc
u
r
s
w
h
e
n
k
e
y
w
o
r
d
s
o
r
o
p
er
ato
r
s
o
b
tain
f
r
o
m
t
h
e
u
s
er
b
y
th
e
ap
p
licatio
n
s
er
v
e
r
ex
ec
u
ted
to
th
e
co
m
p
r
o
m
is
ed
u
p
d
ated
SQL
q
u
er
y
.
C
r
o
s
s
S
ite
Scr
ip
tin
g
(
XS
S)
is
a
tech
n
iq
u
e
w
h
er
e
th
e
J
av
aScr
ip
t,
VB
Scr
ip
t,
A
cti
v
eX,
Fla
s
h
o
r
HT
ML
is
p
lan
ted
alo
n
g
w
it
h
th
e
m
alicio
u
s
XSS
li
n
k
.
W
h
e
n
th
e
i
n
f
ec
ted
lin
k
is
e
x
ec
u
ted
o
r
lo
ad
ed
,
th
e
attac
k
er
w
ill o
b
tai
n
r
o
o
t p
r
iv
ileg
e
a
n
d
all
t
h
e
s
e
n
s
iti
v
e
d
ata
an
d
i
n
f
o
r
m
atio
n
w
i
ll
b
e
lef
t e
x
p
o
s
ed
to
th
e
attac
k
er
.
Var
io
u
s
t
y
p
es
o
f
XSS
ca
n
in
c
lu
d
e
h
ij
ac
k
in
g
t
h
e
s
ess
io
n
,
tak
in
g
ad
v
a
n
ta
g
e
o
f
u
s
er
’
s
p
r
iv
i
leg
e
s
b
y
s
teali
n
g
d
ata,
p
o
s
tin
g
ad
s
i
n
h
id
d
en
I
F
R
A
ME
a
n
d
p
o
p
-
u
p
to
en
co
d
e
t
h
e
m
alicio
u
s
co
d
e
to
m
ai
n
tai
n
t
h
e
o
r
ig
in
ali
t
y
o
f
t
h
e
i
n
f
ec
te
d
co
d
e
th
er
ef
o
r
e
it
ca
n
n
o
t
b
e
d
etec
t
ed
b
y
t
h
e
u
s
er
s
[
4
]
.
T
h
e
attac
k
ca
n
b
e
co
n
d
u
cted
th
r
o
u
g
h
E
m
ail,
s
teali
n
g
u
s
er
’
s
co
o
k
ies,
s
e
n
d
in
g
a
n
u
n
a
u
t
h
o
r
ized
r
eq
u
est,
an
d
X
SS
attac
k
in
co
m
m
e
n
t
f
i
eld
.
I
n
th
i
s
p
ap
er
,
w
e
co
n
s
id
er
ed
W
o
r
d
p
r
ess
attac
k
as
W
o
r
d
p
r
e
s
s
is
t
h
e
m
o
s
t
p
o
p
u
lar
co
n
ten
t
m
an
a
g
e
m
e
n
t
s
y
s
te
m
(
C
MS)
as
d
escr
ib
ed
in
[
1
1
]
,
i
n
w
h
ich
t
h
e
to
p
th
r
ee
C
M
S
a
r
e
W
o
r
d
p
r
ess
5
9
.
8
%,
J
o
o
m
la,
6
.
1
%,
an
d
Dr
u
p
al
4
.
0
%.
Fin
all
y
,
W
P
A
2
attac
k
was c
o
n
s
id
er
ed
b
ec
au
s
e
W
P
A
2
p
r
o
v
id
es th
e
m
o
s
t a
d
v
an
ce
W
i
Fi s
ec
u
r
it
y
[
1
2
]
.
Fig
u
r
e
2
.
P
en
etr
atio
n
test
i
n
g
s
etu
p
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4752
P
en
etra
tio
n
Tes
tin
g
u
s
in
g
K
a
l
i Lin
u
x:
S
QL I
n
jectio
n
,
X
S
S
,
W
o
r
d
p
r
es,
a
n
d
W
P
A
2
(
Ted
d
y
S
u
r
ya
Gu
n
a
w
a
n
)
731
T
h
e
ex
p
er
i
m
e
n
tal
s
etu
p
w
as
p
r
o
v
id
ed
in
d
etails
at
[
9
]
,
an
d
f
o
r
s
i
m
p
licit
y
it
i
s
ill
u
s
tr
ated
f
u
r
th
er
a
s
s
h
o
w
n
in
Fig
u
r
e
.
2
.
T
h
e
h
o
s
t
an
d
th
e
tar
g
et
co
m
p
u
ter
is
a
co
m
p
u
ter
w
it
h
I
n
tel
C
o
r
e
i5
-
6
5
0
,
8
GB
R
A
M,
an
d
W
in
d
o
w
s
1
0
v
er
s
io
n
1
7
0
9
o
p
er
atin
g
s
y
s
te
m
.
I
n
t
h
i
s
h
o
s
t
co
m
p
u
ter
,
w
e
i
n
s
ta
lled
X
A
M
MP
s
er
v
er
,
DVW
A
(
Da
m
n
V
u
ln
er
ab
ilit
y
W
eb
A
p
p
licatio
n
,
h
t
tp
://
www
.
d
v
w
a.
co
,
u
k
)
,
a
n
d
W
o
r
d
p
r
ess
.
T
h
e
Kal
i L
i
n
u
x
2
.
0
r
u
n
s
o
n
v
ir
tu
a
l
m
ac
h
i
n
e
w
ith
v
ar
io
u
s
to
o
ls
f
o
r
p
en
etr
atio
n
te
s
tin
g
,
i.e
.
s
q
l
m
ap
,
b
ee
f
,
w
p
s
ca
n
,
an
d
f
lu
x
io
n
.
On
t
h
e
W
P
A
2
attac
k
,
th
e
h
o
s
t
W
in
d
o
w
s
1
0
cr
ea
tes
a
co
m
p
r
o
m
is
ed
W
iFi
h
o
ts
p
o
t,
an
d
Kali
L
i
n
u
x
v
ir
t
u
al
m
ac
h
in
e
at
tack
t
h
e
h
o
ts
p
o
t
to
o
b
tain
p
ass
w
o
r
d
f
o
r
th
e
W
iF
i
h
o
ts
p
o
t.
T
h
e
W
in
d
o
w
s
1
0
h
o
s
t
m
ac
h
in
e
an
d
Kali
L
i
n
u
x
is
co
n
n
ec
ted
th
r
o
u
g
h
v
i
r
tu
al
n
et
w
o
r
k
.
T
h
e
v
ir
t
u
al
m
a
ch
in
e
h
a
s
i
ts
o
w
n
v
ir
t
u
al
n
et
wo
r
k
ad
ap
ter
w
it
h
its
o
w
n
I
P
ad
d
r
ess
.
L
ast
l
y
,
Fi
g
u
r
e
.
3
illu
s
tr
ates t
h
e
f
lo
w
c
h
ar
t o
f
SQLi,
XSS,
an
d
W
P
A
2
attac
k
i
m
p
le
m
e
n
tat
io
n
.
Fig
u
r
e
3
.
Flo
w
c
h
ar
t o
f
SQ
L
i
n
j
ec
tio
n
(
SQL
i)
,
cr
o
s
s
s
ite
s
cr
ip
tin
g
(
XSS),
an
d
W
P
A
2
attac
k
2
.
1
.
SQ
L
I
nje
ct
io
n
SQL
in
j
ec
tio
n
p
r
o
ce
s
s
ca
n
b
e
illu
s
tr
ated
as
s
h
o
w
n
in
Fig
u
r
e
3
(
a)
.
First,
w
e
s
tar
t
th
e
s
q
l
m
a
p
to
o
ls
on
Kali
L
in
u
x
b
y
s
i
m
p
l
y
e
n
ter
s
q
l
m
ap
o
n
ter
m
i
n
al
w
i
n
d
o
w
.
SQ
L
Ma
p
is
a
n
ad
v
a
n
ce
d
an
d
au
to
m
atic
S
Q
L
in
j
ec
tio
n
to
o
l
w
h
ic
h
m
ain
p
u
r
p
o
s
e
is
to
s
ca
n
,
d
etec
t,
an
d
ex
p
lo
it
th
e
SQL
i
n
j
ec
tio
n
f
la
w
s
f
o
r
a
g
iv
en
UR
L
[
7
]
.
T
h
e
f
o
llo
w
in
g
co
m
m
a
n
d
is
en
ter
ed
o
n
ter
m
i
n
al
w
i
n
d
o
w
to
lau
n
c
h
th
e
SQL
i:
s
q
l
m
ap
-
u
‘
h
ttp
://1
9
2
.
1
6
8
.
2
3
4
.
1
/DVW
A
/
v
u
l
n
er
ab
ilit
ie
s
/s
q
li/?
id
=1
0
Su
b
m
it
&
S
u
b
m
it
’
2
.
2
.
Cro
s
s
Sit
e
Script
ing
(
XSS)
I
n
XS
S
attac
k
,
w
e
will
u
s
e
a
to
o
l
ca
lled
B
r
o
w
s
er
E
x
p
lo
itatio
n
Fra
m
e
w
o
r
k
(
B
eE
F,
h
ttp
://
www
.
b
ee
f
p
r
o
j
ec
t.c
o
m
)
as
s
h
o
w
n
in
Fig
u
r
e
3
(
b
)
.
B
eE
F
is
u
til
ized
to
h
o
o
k
t
h
e
w
eb
s
ite
w
i
th
J
av
aScr
ip
t
s
o
th
at
th
e
a
ttack
e
r
w
ill
b
e
ab
le
th
e
ac
ce
s
s
o
f
v
ic
ti
m
m
ac
h
in
e
r
e
m
o
tel
y
.
Ne
x
t,
w
e
h
o
o
k
ed
th
e
w
eb
s
i
te
w
ith
‘
<scr
ip
t
s
r
c=
"
h
ttp
://1
9
2
.
1
6
8
.
2
3
4
.
1
3
1
:3
0
0
0
/
h
o
o
k
.
j
s
"
><
/s
cr
ip
t>’
J
av
aScr
ip
t.
On
ce
h
o
o
k
ed
,
w
e
cr
ea
ted
a
p
o
p
u
n
d
er
w
h
ic
h
w
ill
m
a
k
e
s
th
e
v
ic
ti
m
’
s
b
r
o
w
s
er
i
s
al
w
a
y
s
o
n
li
n
e.
T
h
en
w
e
r
ed
ir
ec
ted
t
h
e
v
icti
m
to
a
p
h
is
h
in
g
w
eb
s
ite.
T
h
e
v
icti
m
is
th
e
n
p
er
s
u
ad
ed
to
d
o
w
n
lo
ad
an
d
la
u
n
ch
t
h
e
m
alicio
u
s
b
ac
k
d
o
o
r
s
o
f
t
w
ar
e
to
e
n
ab
le
r
ev
er
s
e
T
C
P
o
n
v
ic
ti
m
’
s
m
ac
h
i
n
e.
O
n
ce
,
th
e
m
alicio
u
s
b
ac
k
d
o
o
r
s
o
f
t
w
ar
e
lau
n
c
h
ed
o
n
v
icti
m
’
s
m
ac
h
i
n
e,
w
e
lau
n
c
h
an
o
th
er
to
o
l
ca
lled
Me
tasp
lo
it.
Me
tasp
lo
it
is
o
n
e
o
f
th
e
m
o
s
t
ef
f
icien
t,
p
o
w
er
f
u
l,
an
d
all
-
in
-
o
n
e
ce
n
tr
alize
d
f
r
o
n
t
-
e
n
d
in
ter
f
ac
es
f
o
r
ex
p
lo
itatio
n
[
7
]
.
2
.
3
.
Wo
rdP
re
s
s
At
t
a
ck
I
n
W
o
r
d
P
r
ess
attac
k
,
w
p
s
ca
n
to
o
l
w
ill
b
e
u
til
ized
.
T
h
e
f
o
llo
w
i
n
g
co
m
m
a
n
d
i
s
u
s
ed
to
h
ac
k
a
n
d
attac
k
a
W
o
r
d
P
r
ess
w
eb
s
i
te
to
o
b
tain
in
f
o
r
m
atio
n
b
eh
in
d
th
e
W
o
r
d
Pre
s
s
s
ite:
w
p
s
ca
n
--
u
r
l
1
9
2
.
1
6
8
.
2
3
4
.
1
/
w
o
r
d
p
r
ess
--
e
n
u
m
er
ate
u
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4752
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci,
Vo
l.
12
,
No
.
2
,
No
v
e
m
b
er
2
0
1
8
:
7
2
9
–
7
3
7
732
Fig
u
r
e
4
.
Sre
en
s
h
o
t o
f
w
p
s
ca
n
to
o
l in
k
ali
li
n
u
x
2
.
4
.
WP
A2
At
t
a
ck
Fo
r
W
i
-
Fi
n
et
w
o
r
k
W
P
A
2
at
tack
,
f
l
u
x
io
n
is
u
s
ed
f
o
r
s
i
m
u
latio
n
.
F
lu
x
io
n
i
s
an
o
p
en
s
o
u
r
ce
to
o
l
w
h
ic
h
p
r
o
v
id
es
a
u
to
m
ated
p
r
o
ce
s
s
o
f
cr
ac
k
i
n
g
W
P
A
/W
P
A2
W
i
-
Fi
n
et
w
o
r
k
b
y
u
ti
lizi
n
g
f
a
k
e
A
cc
e
s
s
P
o
in
t
(
A
P
)
an
d
p
h
is
h
i
n
g
tech
n
iq
u
e
as
ill
u
s
tr
ated
i
n
Fi
g
u
r
e
.
3
(
c)
.
T
h
e
f
lu
x
io
n
to
o
l
ca
n
b
e
d
o
w
n
lo
ad
an
d
in
s
ta
ll
b
y
u
tili
zi
n
g
co
m
m
a
n
d
g
it c
lo
n
e
i
n
t
h
e
Kali
L
in
u
x
’
s
ter
m
i
n
al.
T
h
e
f
ir
s
t
s
tep
is
to
s
ca
n
t
h
e
W
i
-
Fi ch
a
n
n
el.
T
h
en
w
e
s
elec
t
th
e
W
i
-
Fi
ch
a
n
n
e
l
o
f
o
u
r
tar
g
et.
T
h
e
n
ex
t
p
r
o
ce
s
s
is
to
ca
p
tu
r
e
th
e
h
an
d
s
h
a
k
e.
T
h
e
h
an
d
s
h
ak
e
i
s
ca
p
tu
r
ed
u
s
i
n
g
h
o
s
tap
d
.
Usi
n
g
t
h
is
p
r
o
ce
s
s
,
th
e
W
i
-
Fi
n
et
w
o
r
k
w
ill
b
e
d
i
s
co
n
n
ec
ted
f
r
o
m
clie
n
t
n
et
w
o
r
k
.
W
h
en
th
e
v
icti
m
a
tte
m
p
t
s
to
co
n
n
ec
t
to
th
e
W
i
-
Fi
ag
ai
n
,
th
e
clien
t
an
d
W
i
-
F
i
h
o
ts
p
o
t
w
ill
d
o
f
o
u
r
-
w
a
y
h
an
d
s
h
a
k
e
w
h
ic
h
b
asicall
y
e
x
ch
a
n
g
in
g
k
e
y
s
b
et
w
ee
n
t
h
e
m
.
T
h
ese
k
e
y
s
ar
e
m
a
s
ter
k
e
y
an
d
tr
a
n
s
ie
n
t
k
e
y
.
T
h
e
k
e
y
co
n
tai
n
s
a
lo
t
o
f
i
n
f
o
r
m
atio
n
lik
e
th
e
I
P
ad
d
r
ess
o
f
th
e
W
i
-
Fi
h
o
ts
p
o
t,
M
AC
h
ar
d
w
ar
e
ad
d
r
ess
a
n
d
p
ass
w
o
r
d
.
Af
ter
th
a
t,
t
h
e
ca
p
tu
r
ed
h
an
d
s
h
ak
e
w
il
l
b
e
u
s
ed
to
cr
ea
te
r
o
u
g
e
A
P
an
d
f
ak
e
lo
g
in
p
ag
e.
T
h
e
v
icti
m
w
il
l b
e
p
r
o
m
p
ted
a
lo
g
in
p
a
g
e
w
h
ic
h
th
e
y
n
ee
d
to
en
ter
t
h
e
p
ass
w
o
r
d
o
f
th
e
W
i
-
Fi h
o
t
s
p
o
t.
3.
RE
SU
L
T
S
A
ND
D
I
SCU
SS
I
O
N
I
n
th
i
s
s
ec
tio
n
,
e
x
p
er
i
m
e
n
tal
r
esu
lt
s
o
n
SQ
L
i,
XS
S,
W
o
r
d
p
r
ess
a
n
d
W
P
A
2
attac
k
s
w
ill
b
e
d
is
cu
s
s
ed
in
m
o
r
e
d
etails.
T
h
e
e
x
p
er
i
m
e
n
tal
s
et
u
p
w
as
ill
u
s
tr
ated
i
n
F
i
g
u
r
e
.
2
,
w
h
ile
th
e
d
esi
g
n
a
n
d
i
m
p
le
m
e
n
tat
io
n
w
a
s
d
is
cu
s
s
ed
in
Sect
io
n
2
.
3
.
1
.
SQ
L
I
nje
ct
io
n
I
n
th
i
s
ex
p
er
i
m
e
n
t,
B
u
r
p
Su
i
te
(
h
ttp
s
://p
o
r
ts
w
i
g
g
er
.
n
et
/b
u
r
p
)
is
u
tili
ze
d
.
I
t
is
a
J
av
a
b
ased
W
eb
P
en
etr
atio
n
T
esti
n
g
f
r
a
m
e
w
o
r
k
w
h
ic
h
ca
n
b
e
u
s
ed
f
o
r
s
ca
n
n
in
g
a
n
d
g
at
h
er
i
n
g
d
ata
o
f
w
eb
ap
p
licatio
n
attac
k
.
I
t
g
ath
er
s
,
co
llects,
an
d
i
n
ter
ce
p
ts
HT
T
P
GE
T
an
d
P
OS
T
r
eq
u
est
f
r
o
m
w
eb
s
er
v
er
.
T
h
e
HT
T
P
GE
T
is
a
p
r
o
ce
s
s
in
w
h
ic
h
t
h
e
w
eb
s
it
e
w
ill
s
e
n
d
t
h
e
i
n
p
u
t
en
ter
e
d
f
r
o
m
t
h
e
u
s
er
to
b
e
r
etr
ie
v
e
f
r
o
m
d
atab
ases
.
No
ted
th
at,
th
e
i
n
p
u
t
e
n
ter
ed
is
u
n
k
n
o
w
n
an
d
a
n
y
i
n
p
u
t
ca
n
b
e
en
ter
ed
to
m
a
k
e
th
e
w
eb
s
ite
s
e
n
d
th
e
HT
T
P
GE
T
r
eq
u
est
to
th
e
d
atab
ase
s
o
th
at
it
ca
n
b
e
i
n
ter
ce
p
ted
b
y
B
u
r
p
S
u
ite.
Mo
r
eo
v
er
,
th
e
w
eb
s
i
te
co
o
k
ie
al
s
o
ca
n
b
e
ca
p
tu
r
ed
w
h
ich
i
s
ess
e
n
tial
to
ea
s
e
th
e
ac
ce
s
s
to
th
e
s
q
l
d
atab
ase.
E
v
en
th
o
u
g
h
th
e
B
u
r
p
Su
ite
laid
o
u
t
co
n
s
id
er
ab
l
y
ev
er
y
th
i
n
g
,
w
e
h
ad
to
d
o
s
lig
h
t
m
o
d
if
ica
tio
n
o
n
th
e
UR
L
ad
d
r
ess
o
f
H
T
T
P
GE
T
r
eq
u
est
.
First,
w
e
id
en
ti
f
ied
th
e
h
o
s
t
a
n
d
th
e
GE
T
r
eq
u
est.
T
h
en
,
w
e
co
m
b
i
n
ed
th
e
h
o
s
t
an
d
th
e
G
E
T
r
eq
u
est
in
to
o
n
e
UR
L
ad
d
r
ess
.
As ca
n
b
e
e
x
a
m
in
ed
i
n
Fi
g
u
r
e
5
,
th
e
s
q
l
m
ap
atte
m
p
t
s
n
u
m
b
e
r
o
f
co
m
b
i
n
atio
n
s
o
f
i
n
j
ec
tio
n
w
h
ic
h
ar
e
B
o
o
lean
ex
p
r
ess
io
n
,
Gen
er
ic
Un
io
n
q
u
er
y
,
a
n
d
O
R
DE
R
B
Y
tech
n
iq
u
e.
T
h
en
t
h
e
p
a
y
lo
ad
w
a
s
d
eter
m
i
n
ed
w
h
ic
h
i
s
id
=1
0
.
P
ay
lo
ad
is
t
h
e
p
ar
t
o
f
tr
an
s
m
itted
d
ata
w
h
ic
h
t
h
e
m
es
s
ag
e
s
o
r
i
n
ten
d
ed
i
n
f
o
r
m
atio
n
t
h
at
n
ee
d
to
b
e
r
elay
ed
to
t
h
e
i
n
te
n
d
ed
r
ec
eiv
er
.
T
h
e
co
o
k
ies
p
r
o
v
id
ed
alo
n
g
w
i
th
th
e
s
q
l
m
ap
at
tac
k
is
v
er
y
u
s
e
f
u
l
f
o
r
s
q
l
m
ap
to
ar
tif
icia
ll
y
m
a
n
ip
u
late
th
e
d
atab
ase
in
to
ass
u
m
i
n
g
t
h
at
t
h
e
attac
k
er
h
as
p
r
ev
io
u
s
ac
ce
s
s
to
th
e
w
eb
s
i
te.
F
u
r
th
er
m
o
r
e,
s
q
l
m
ap
also
ab
le
to
id
en
ti
f
y
t
h
e
t
y
p
e
o
f
d
atab
ase.
On
ce
t
h
e
d
ata
b
ase
is
id
en
ti
f
ied
it
f
u
r
t
h
er
th
e
attac
k
s
to
ex
p
lo
it
th
e
s
y
s
te
m
i
n
f
o
r
m
atio
n
o
f
th
e
d
atab
ase
an
d
th
e
OS
o
r
w
eb
s
er
v
er
p
latf
o
r
m
a
s
s
h
o
w
n
in
T
ab
le
1
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4752
P
en
etra
tio
n
Tes
tin
g
u
s
in
g
K
a
l
i Lin
u
x:
S
QL I
n
jectio
n
,
X
S
S
,
W
o
r
d
p
r
es,
a
n
d
W
P
A
2
(
Ted
d
y
S
u
r
ya
Gu
n
a
w
a
n
)
733
[
1
5
:
4
7
:
1
5
]
[
I
N
F
O
]
t
e
st
i
n
g
'A
N
D
b
o
o
l
e
a
n
-
b
a
se
d
b
l
i
n
d
-
W
H
ER
E
o
r
H
A
V
I
N
G
c
l
a
u
se
'
[
1
5
:
4
7
:
1
5
]
[
W
A
R
N
I
N
G
]
r
e
f
l
e
c
t
i
v
e
v
a
l
u
e
(
s)
f
o
u
n
d
a
n
d
f
i
l
t
e
r
i
n
g
o
u
t
[
1
5
:
4
7
:
1
5
]
[
I
N
F
O
]
t
e
st
i
n
g
'G
e
n
e
r
i
c
U
N
I
O
N
q
u
e
r
y
(
N
U
LL
)
-
1
t
o
1
0
c
o
l
u
mn
s'
[
1
5
:
4
7
:
1
6
]
[
I
N
F
O
]
'O
R
D
ER
B
Y
'
t
e
c
h
n
i
q
u
e
a
p
p
e
a
r
s t
o
b
e
u
sa
b
l
e
.
T
h
i
s s
h
o
u
l
d
r
e
d
u
c
e
t
h
e
t
i
me
n
e
e
d
e
d
t
o
f
i
n
d
t
h
e
r
i
g
h
t
n
u
mb
e
r
o
f
q
u
e
r
y
c
o
l
u
mn
s.
A
u
t
o
mat
i
c
a
l
l
y
e
x
t
e
n
d
i
n
g
t
h
e
r
a
n
g
e
f
o
r
c
u
r
r
e
n
t
U
N
I
O
N
q
u
e
r
y
i
n
j
e
c
t
i
o
n
t
e
c
h
n
i
q
u
e
t
e
st
w
e
b
a
p
p
l
i
c
a
t
i
o
n
t
e
c
h
n
o
l
o
g
y
:
P
H
P
7
.
1
.
1
1
,
A
p
a
c
h
e
2
.
4
.
2
9
b
a
c
k
-
e
n
d
D
B
M
S
:
M
y
S
Q
L
>
=
5
.
0
.
0
(
M
a
r
i
a
D
B
f
o
r
k
)
[
1
5
:
4
7
:
2
1
]
[
I
N
F
O
]
f
e
t
c
h
i
n
g
d
a
t
a
b
a
se
n
a
me
s a
v
a
i
l
a
b
l
e
d
a
t
a
b
a
se
s [7
]
:
[
*
]
d
v
w
a
[
*
]
i
n
f
o
r
mat
i
o
n
_
sc
h
e
ma
[
*
]
my
sq
l
[
*
]
p
e
r
f
o
r
man
c
e
_
s
c
h
e
ma
[
*
]
p
h
p
my
a
d
mi
n
[
*
]
t
e
st
[
*
]
w
o
r
d
p
r
e
ss
Fig
u
r
e
5
.
Sq
l
m
ap
attac
k
lo
g
f
il
e
T
ab
le
1
.
Sq
lm
ap
E
x
tr
ac
ted
I
n
f
o
r
m
at
io
n
T
y
p
e
o
f
i
n
f
o
r
m
a
t
i
o
n
E
x
t
r
a
c
t
e
d
D
e
t
a
i
l
s
Ty
p
e
o
f
d
a
t
a
b
a
se
M
y
S
Q
L
W
e
b
se
r
v
e
r
o
p
e
r
a
t
i
n
g
sy
st
e
ms
W
i
n
d
o
w
s
W
e
b
a
p
p
l
i
c
a
t
i
o
n
t
e
c
h
n
o
l
o
g
y
P
H
P
7
.
1
.
1
1
,
A
p
a
c
h
e
2
.
4
.
2
9
B
a
c
k
-
e
n
d
D
B
M
S
M
y
S
Q
L
>
=
5
.
0
.
0
(
M
a
r
i
a
D
B
f
o
r
k
)
D
a
t
a
b
a
se
c
o
n
t
e
n
t
s
d
v
w
a
,
i
n
f
o
r
ma
t
i
o
n
_
s
c
h
e
me
,
my
sq
l
,
p
e
r
f
o
r
man
c
e
_
sc
h
e
me
,
p
h
p
my
a
d
mi
n
,
t
e
st
,
w
o
r
d
p
r
e
ss
As
d
is
cu
s
s
ed
in
[
1
3
]
,
th
e
SQ
L
w
as
e
x
p
lo
itab
le
b
y
s
y
n
ta
x
o
f
o
n
e
s
in
g
le
q
u
o
te
as
w
h
at
w
e
d
id
in
th
is
r
esear
ch
p
r
o
j
ec
t.
T
h
e
n
u
m
b
er
1
0
d
id
n
o
t
ex
is
t
in
t
h
e
S
Q
L
d
a
tab
ase
w
e
i
n
j
ec
ted
.
W
ith
th
e
s
y
n
ta
x
o
f
o
n
e
s
i
n
g
le
q
u
o
te
in
s
er
ted
alo
n
g
th
e
i
n
p
u
t
1
0
,
it
m
ak
e
s
th
e
d
atab
ase
e
x
p
lo
itab
le.
Ord
er
b
y
q
u
er
y
is
u
s
ed
to
tr
ea
s
u
r
e
th
e
n
u
m
b
er
o
f
co
lu
m
n
t
h
at
ex
i
s
t
s
in
th
e
d
atab
ase
tab
le
an
d
u
n
io
n
s
elec
t
o
r
u
n
i
o
n
a
ll
s
elec
t
q
u
er
y
is
u
s
ed
to
ex
p
lo
r
e
th
e
v
u
l
n
er
ab
le
co
lu
m
n
s
in
th
e
d
atab
ase
tab
le
[
1
3
]
.
T
h
e
u
s
a
g
e
o
f
t
h
ese
q
u
er
ies
ca
n
b
e
o
b
s
er
v
ed
i
n
th
e
s
q
l
m
ap
lo
g
f
ile
as d
is
p
la
y
ed
in
Fig
u
r
e
5
.
Fig
u
r
e
6
.
T
h
e
m
o
s
t a
cc
es
s
ed
d
ir
ec
to
r
ies o
n
SQL
i
n
j
ec
tio
n
an
al
y
ze
d
b
y
Dee
p
L
o
g
An
al
y
ze
r
On
th
e
v
icti
m
m
ac
h
i
n
e,
t
h
e
Ap
ac
h
e
w
eb
s
er
v
er
lo
g
f
i
les
co
u
ld
b
e
f
u
r
th
er
an
al
y
ze
d
u
s
in
g
Dee
p
L
o
g
An
al
y
ze
r
.
Usi
n
g
th
e
s
o
f
t
w
ar
e,
it
is
f
o
u
n
d
th
a
t
th
e
m
o
s
t
ac
ce
s
s
ed
d
ir
ec
to
r
y
is
/d
v
w
a/
v
u
l
n
er
ab
ilit
ies/
s
q
li
as
s
h
o
w
n
i
n
Fi
g
u
r
e
.
6
.
T
h
is
f
o
ld
er
is
th
e
DVW
A
w
eb
s
ite
f
o
ld
er
w
h
ic
h
co
n
tain
s
t
h
e
SQ
L
i
n
j
ec
tio
n
f
o
ld
er
.
I
t r
ec
eiv
ed
3
9
9
h
its
w
h
ic
h
w
er
e
m
o
s
tl
y
f
r
o
m
s
q
l
m
ap
to
o
ls
.
3
.
2
.
XSS a
t
t
a
ck
I
n
XSS
attac
k
,
t
h
e
ac
ce
s
s
lo
g
f
ile
d
id
n
o
t
lo
g
an
y
t
h
i
n
g
s
ig
n
if
ica
n
t.
He
n
ce
,
th
e
Dee
p
L
o
g
An
al
y
ze
r
co
u
ld
n
o
t
r
ec
o
r
d
an
y
s
u
s
p
icio
u
s
o
r
m
alic
io
u
s
t
h
i
n
g
s
.
Ho
w
ev
er
,
b
y
m
a
n
u
all
y
g
o
i
n
g
th
r
o
u
g
h
th
e
ac
ce
s
s
lo
g
f
ile,
th
er
e
i
s
a
s
i
g
n
if
ica
n
t
ev
e
n
t
th
at
p
o
r
tr
ay
s
t
h
at
th
e
w
eb
s
er
v
er
w
as
e
x
p
lo
ited
.
A
s
ca
n
b
e
s
e
en
i
n
Fi
g
u
r
e
.
7
,
t
h
e
ac
ce
s
s
lo
g
f
ile
s
lo
g
g
ed
th
e
i
n
j
ec
ted
o
f
m
alicio
u
s
J
av
aScr
ip
t
o
n
t
h
e
w
eb
s
ite.
T
h
is
w
as
tr
u
e
s
in
ce
,
w
e
h
o
o
k
t
h
e
w
eb
s
i
te
w
it
h
J
av
aScr
ip
t d
u
r
in
g
th
e
attac
k
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4752
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci,
Vo
l.
12
,
No
.
2
,
No
v
e
m
b
er
2
0
1
8
:
7
2
9
–
7
3
7
734
Fig
u
r
e
7
.
A
p
ac
h
e
L
o
g
V
ie
w
er
d
is
p
la
y
s
t
h
e
ev
e
n
t o
f
t
h
e
w
eb
s
er
v
er
b
ein
g
e
x
p
lo
ited
As
s
tate
d
b
y
[
4
]
,
th
is
XSS
att
ac
k
u
s
ed
in
co
m
m
e
n
t
f
ie
ld
w
h
er
e
th
e
attac
k
er
m
o
d
if
y
in
g
th
e
co
m
m
e
n
t
f
ield
w
it
h
m
alic
io
u
s
s
cr
ip
t.
T
h
e
au
t
h
o
r
s
co
n
d
u
cted
XS
S
att
ac
k
to
m
o
d
if
y
th
e
w
eb
s
i
te
b
y
in
s
er
ti
n
g
m
alic
io
u
s
s
cr
ip
t
r
esu
lti
n
g
in
m
o
d
i
f
y
in
g
t
h
e
ap
p
ea
r
an
ce
o
f
th
e
w
eb
s
ite
(
ch
an
g
i
n
g
t
h
e
f
o
r
m
at
o
f
th
e
web
s
ite
to
b
o
ld
an
d
f
o
n
t,
c
h
a
n
g
i
n
g
t
h
e
co
lo
r
an
d
,
t
h
e
b
ac
k
g
r
o
u
n
d
o
f
t
h
e
w
eb
s
ite)
.
I
n
o
u
r
e
x
p
er
i
m
e
n
t,
w
e
i
n
s
er
t
ed
m
alicio
u
s
s
cr
ip
t
to
th
e
v
ic
ti
m
’
s
w
eb
s
er
v
er
to
g
ain
ac
ce
s
s
to
t
h
e
v
icti
m
’
s
m
ac
h
in
e
b
y
p
er
s
u
ad
i
n
g
th
e
v
ict
i
m
to
d
o
w
n
lo
ad
an
d
r
u
n
t
h
e
b
ac
k
d
o
o
r
s
o
f
t
w
ar
e
w
h
i
ch
estab
lis
h
co
n
n
ec
tio
n
u
s
in
g
r
ev
er
s
e
T
C
P
[
6
]
.
H
o
st
:
1
9
2
.
1
6
8
.
2
3
4
.
1
T
i
me
:
2
4
/
D
e
c
/
2
0
1
7
:
0
0
:
0
1
:
4
5
+
0
8
0
0
R
e
q
u
e
st
:
“
G
ET
/
D
V
W
A
/
v
u
l
n
e
r
a
b
i
l
i
t
i
e
s/
x
ss_
r
/
?
n
a
me
=
%3
C
scri
p
t
+
sr
c
%3
D
%2
2
h
t
t
p
%3
A
%2
F
%2
F
1
9
2
.
1
6
8
.
2
3
4
.
1
3
1
%
3
A
3
0
0
0
%
2
F
h
o
o
k
.
j
s
%2
2
%
3
E
%3
C
%
2
F
scri
p
t
%
3
E
H
T
T
P
/
1
.
1
"
D
e
st
i
n
a
t
i
o
n
:
h
t
t
p
:
/
/
1
9
2
.
1
6
8
.
2
3
4
.
1
/
D
V
W
A
/
v
u
l
n
e
r
a
b
i
l
i
t
i
e
s/
x
ss_
r
/
U
se
r
A
g
e
n
t
:
"
M
o
z
i
l
l
a
/
5
.
0
(
W
i
n
d
o
w
s NT
1
0
.
0
;
W
O
W
6
4
;
T
r
i
d
e
n
t
/
7
.
0
;
r
v
:
1
1
.
0
)
l
i
k
e
G
e
c
k
o
"
Fig
u
r
e
8
: T
h
e
ev
en
t o
f
lo
g
f
ile
h
ig
h
li
g
h
ti
n
g
t
h
e
ex
p
lo
ited
w
e
b
s
er
v
er
B
y
o
b
s
er
v
i
n
g
th
e
lo
g
f
ile
h
ig
h
li
g
h
ted
in
Fi
g
u
r
e
.
8
,
t
h
e
w
e
b
s
ite
s
e
n
t
a
HT
T
P
GE
T
r
eq
u
est
to
t
h
e
w
eb
s
er
v
er
.
T
h
e
HT
T
P
GE
T
r
eq
u
est
s
en
t
w
a
s
a
h
o
o
k
J
av
a
S
cr
ip
t
th
at
w
ill
h
o
o
k
th
e
en
t
ir
e
w
eb
b
r
o
w
s
er
to
t
h
e
B
eE
F
to
o
l
o
n
Kali
L
in
u
x
.
A
t
t
h
is
s
ta
g
e,
w
e
k
n
o
w
t
h
at
t
h
e
web
s
er
v
er
w
a
s
e
x
p
lo
ited
.
A
s
li
g
h
t
m
o
d
i
f
icatio
n
o
n
th
e
tec
h
n
iq
u
e
u
s
ed
o
n
t
h
is
atta
ck
w
as
d
o
n
e
i
n
o
r
d
er
to
m
a
k
e
th
e
attac
k
w
o
r
k
i
n
g
.
At
f
ir
s
t,
we
cr
ea
ted
b
ac
k
d
o
o
r
s
o
f
t
w
ar
e
o
n
Kali
L
i
n
u
x
ter
m
i
n
al.
T
h
e
b
ac
k
d
o
o
r
s
o
f
t
w
ar
e
was
cr
ea
ted
to
e
n
s
u
r
e
t
h
e
r
ev
er
s
e
s
h
e
ll
w
o
r
k
s
h
e
n
ce
th
e
r
ev
er
s
e
T
C
P
p
r
o
ce
s
s
co
u
ld
b
e
d
o
n
e.
T
h
en
,
w
e
f
i
g
u
r
e
o
u
t
h
o
w
to
tr
ick
v
icti
m
to
d
o
w
n
lo
ad
th
e
b
ac
k
d
o
o
r
s
o
f
t
w
ar
e
f
r
o
m
o
u
r
Kali
L
i
n
u
x
w
eb
s
er
v
er
.
W
e
cr
ea
ted
a
s
i
m
p
le
p
h
is
h
i
n
g
w
eb
s
ite
an
d
r
ed
ir
ec
ted
th
e
u
s
er
to
t
h
e
p
h
is
h
in
g
w
eb
s
ite,
d
o
w
n
lo
ad
th
e
b
ac
k
d
o
o
r
s
o
f
t
w
ar
e
an
d
r
u
n
it
o
n
th
e
v
icti
m
’
s
m
ac
h
in
e.
T
h
e
p
h
is
h
i
n
g
w
eb
s
ite
w
a
s
cr
ea
ted
w
it
h
H
y
p
er
te
x
t M
ar
k
u
p
L
a
n
g
u
a
g
e
(
HT
ML
)
an
d
C
ascad
in
g
St
y
le
S
h
ee
t (
C
SS
)
.
T
h
e
n
ex
t
s
tep
is
to
lo
o
k
at
p
o
s
t
ex
p
lo
itatio
n
t
h
at
o
cc
u
r
r
ed
o
n
attac
k
er
m
ac
h
in
e.
T
h
e
ex
p
lo
itatio
n
p
r
o
ce
s
s
o
cc
u
r
r
ed
in
Me
tasp
lo
i
t.
A
s
ca
n
b
e
s
ee
n
o
n
Fi
g
u
r
e
.
9
,
th
e
Me
tasp
lo
it
h
as
an
ac
ti
v
e
r
e
m
o
te
s
e
s
s
io
n
o
n
v
icti
m
’
s
m
ac
h
i
n
e
v
ia
r
ev
er
s
e
T
C
P
o
n
I
P
ad
d
r
ess
1
9
2
.
1
6
8
.
2
3
4
.
1
p
o
r
t
4
4
4
4
.
R
ev
er
s
e
T
C
P
is
a
p
r
o
ce
s
s
w
h
ic
h
th
e
w
eb
s
er
v
er
i
n
itiate
co
n
n
ec
tio
n
w
it
h
th
e
clie
n
t
(
w
eb
b
r
o
w
s
er
)
.
R
ev
er
s
e
s
h
ell
w
a
s
ch
o
s
en
to
b
y
p
ass
t
h
e
f
ir
e
w
all
o
f
th
e
w
eb
s
er
v
er
.
A
l
i
s
ten
er
o
n
t
h
e
v
ic
ti
m
’
s
m
ac
h
i
n
e
n
ee
d
ed
to
b
e
s
et
u
p
.
T
h
e
lis
t
en
er
t
h
at
w
as
s
et
u
p
o
n
th
e
v
icti
m
’
s
m
ac
h
i
n
e
w
as
th
e
b
ac
k
d
o
o
r
s
o
f
t
w
ar
e
r
ed
ir
ec
ted
to
th
e
v
ict
i
m
’
s
w
eb
b
r
o
w
s
er
.
At
th
is
s
tag
e,
th
e
attac
k
er
h
as
co
m
p
lete
co
n
tr
o
l
b
y
s
i
m
p
l
y
en
ter
i
n
g
t
h
e
c
o
m
m
a
n
d
i
n
m
eter
p
r
eter
.
So
m
e
o
f
t
h
e
co
m
m
a
n
d
s
w
h
ic
h
ca
n
b
e
u
s
ed
is
lis
ted
i
n
T
ab
le
2
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4752
P
en
etra
tio
n
Tes
tin
g
u
s
in
g
K
a
l
i Lin
u
x:
S
QL I
n
jectio
n
,
X
S
S
,
W
o
r
d
p
r
es,
a
n
d
W
P
A
2
(
Ted
d
y
S
u
r
ya
Gu
n
a
w
a
n
)
735
Fig
u
r
e
9
.
Me
tasp
lo
it
co
m
m
a
n
d
w
er
e
in
p
u
tted
to
ex
p
lo
it v
ict
i
m
'
s
m
ac
h
i
n
e
T
ab
le
2
.
L
is
t o
f
C
o
m
m
an
d
s
o
n
Me
tasp
lo
it
C
o
m
m
a
n
d
E
x
p
l
a
n
a
t
i
o
n
se
ssi
o
n
s
-
i
1
S
t
a
r
t
se
ssi
o
n
w
i
t
h
v
i
c
t
i
m’
s ma
c
h
i
n
e
sy
si
n
f
o
S
h
o
w
b
r
i
e
f
i
n
f
o
r
mat
i
o
n
a
b
o
u
t
t
h
e
v
i
c
t
i
m
’
s ma
c
h
i
n
e
r
u
n
v
n
c
R
u
n
V
i
r
t
u
a
l
N
e
t
w
o
r
k
C
o
mp
u
t
e
r
w
h
i
c
h
w
i
l
l
d
i
sp
l
a
y
t
h
e
o
u
t
p
u
t
o
f
v
i
c
t
i
m’
s
mac
h
i
n
e
t
a
s
k
l
i
st
D
i
sp
l
a
y
t
h
e
r
u
n
n
i
n
g
p
r
o
c
e
ss o
f
v
i
c
t
i
m
’
s ma
c
h
i
n
e
sy
st
e
mi
n
f
o
D
i
sp
l
a
y
d
e
t
a
i
l
e
d
sy
st
e
m i
n
f
o
r
mat
i
o
n
a
b
o
u
t
v
i
c
t
i
m’
s
ma
c
h
i
n
e
sh
e
l
l
G
a
i
n
a
c
c
e
ss t
o
c
o
mm
a
n
d
p
r
o
m
p
t
o
f
v
i
c
t
i
m’
s ma
c
h
i
n
e
3.
3
.
Wo
rdP
re
s
s
a
t
t
a
ck
I
n
W
o
r
d
P
r
ess
attac
k
,
w
p
s
ca
n
to
o
l
w
a
s
u
s
ed
to
en
u
m
er
ate
th
e
u
s
er
n
a
m
e
o
f
t
h
e
W
o
r
d
Pre
s
s
u
s
er
.
Fig
u
r
e
1
0
illu
s
tr
ates
th
e
lo
g
f
i
le
o
f
w
p
s
ca
n
attac
k
o
n
attac
k
e
r
’
s
m
ac
h
in
e
(
Kali
L
i
n
u
x
)
.
T
h
e
w
p
s
ca
n
e
x
a
m
i
n
ed
th
e
W
o
r
d
Pre
s
s
d
ir
ec
to
r
y
in
t
h
e
w
eb
s
er
v
er
.
w
p
s
ca
n
id
en
ti
f
ie
d
th
e
w
h
o
le
co
m
p
lete
s
et
o
f
i
n
f
o
r
m
atio
n
ab
o
u
t
th
e
W
o
r
d
P
r
ess
w
a
s
r
u
n
n
i
n
g
o
n
.
T
h
e
W
o
r
d
P
r
ess
w
er
e
o
n
s
er
v
er
A
p
ac
h
e
v
er
s
io
n
2
.
4
.
2
9
a
n
d
o
n
P
HP
v
er
s
io
n
7
.
1
.
1
1
.
T
h
e
W
o
r
d
P
r
ess
w
er
e
u
s
i
n
g
a
t
h
e
m
e
n
a
m
ed
t
w
e
n
t
y
s
ev
en
tee
n
.
T
h
e
u
s
er
n
a
m
e
th
at
h
as
b
ee
n
d
is
co
v
er
ed
b
y
t
h
e
w
p
s
ca
n
is
m
ttli
m
w
h
ic
h
w
as
u
s
ed
to
lo
g
i
n
to
th
e
W
o
r
d
P
r
ess
d
ash
b
o
ar
d
.
On
t
h
e
v
ic
ti
m
’
s
m
ac
h
i
n
e,
t
h
e
ac
ce
s
s
f
ile
w
as
r
etr
ie
v
ed
an
d
f
e
w
i
n
f
o
r
m
atio
n
ca
n
b
e
ex
tr
ac
t
ed
to
s
h
o
w
th
e
attac
k
i
n
g
w
as
tak
i
n
g
p
lace
.
T
o
ex
am
i
n
e
t
h
e
at
tack
,
Dee
p
L
o
g
A
n
a
l
y
ze
r
w
a
s
u
s
ed
a
g
ain
.
Fig
u
r
e
.
1
1
s
h
o
ws
th
at
w
p
s
ca
n
ac
ce
s
s
t
h
e
W
o
r
d
Pre
s
s
d
atab
ase
th
e
m
o
s
t
w
it
h
8
8
h
its
.
I
t a
l
s
o
ca
n
b
e
ex
a
m
i
n
ed
t
h
at
w
p
s
ca
n
b
y
p
as
s
th
e
W
o
r
d
P
r
ess
s
ec
u
r
it
y
b
y
r
etr
iev
i
n
g
r
estricte
d
d
ata
f
r
o
m
t
h
e
d
atab
ase
w
i
t
h
HT
T
P
GE
T
r
eq
u
est.
A
s
s
u
g
g
e
s
ted
b
y
[
5
]
,
th
e
W
o
r
d
P
r
ess
attac
k
w
a
s
ac
h
ie
v
ed
b
y
u
s
i
n
g
w
p
s
ca
n
to
en
u
m
er
ate
t
h
e
u
s
er
n
a
m
e.
T
h
e
ap
ac
h
e
lo
g
f
ile
n
ee
d
to
b
e
ex
a
m
in
ed
f
o
r
th
e
attac
k
i
n
g
e
v
en
t.
T
h
e
m
u
ltip
l
e
s
eq
u
en
ce
o
f
HT
T
P
r
eq
u
est
r
etr
iev
ed
f
r
o
m
th
e
ap
ac
h
e
lo
g
f
i
le
in
d
icate
d
t
h
at
th
e
w
p
s
ca
n
w
as
attac
k
i
n
g
th
e
w
eb
s
er
v
er
to
o
b
tain
t
h
e
u
s
er
n
a
m
e
o
f
th
e
W
o
r
d
P
r
ess
ac
co
u
n
t.
[
32
m
[
+
]
[
0
m
UR
L
:
h
t
tp
:
//
1
92.
168.
234.
1
:
80
80/wor
d
pr
e
s
s
/
[
32
m
[
+
]
[
0
m
S
tar
ted
:
T
hu
De
c
28
15
:
20
:04
2017
[
33
m
[
!
]
[
0
m
T
h
e
W
or
dP
r
e
s
s
'
htt
p
:/
/192.
168.
23
4.
1
:
8080/
wor
dp
r
e
s
s
/r
e
a
d
m
e
.
h
t
m
l'
f
il
e
e
xi
s
ts
e
x
pos
ing
a
v
e
r
s
i
o
n
number
[
33
m
[
!
]
[
0
m
F
ull
P
a
t
h
Di
s
c
l
os
ur
e
(
F
P
D
)
in
'
htt
p
:/
/192.
168.
23
4.
1
:
8080/
wor
dp
r
e
s
s
/wp
-
in
c
ludes
/r
s
s
-
f
unc
t
i
o
n
s
.
p
h
p
'
:
[
32
m
[
+
]
[
0
m
I
n
ter
e
s
t
ing
h
e
a
de
r
:
L
I
N
K:
<
h
tt
p
:
//
loca
lh
os
t
:
80
80/wo
r
dpr
e
s
s
/wp
-
js
o
n
/
>
;
r
e
l
=
"
h
t
tps
:
//
a
p
i
.
w.
or
g/"
[
32
m
[
+
]
[
0
m
I
n
te
r
e
s
t
ing
h
e
a
de
r
:
S
E
R
V
E
R
:
A
pa
c
h
e
/
2.
4.
29
(
W
in32)
Ope
nS
S
L
/1.
0.
2
l
P
HP/
7.
1.
11
[
32
m
[
+
]
[
0
m
I
n
te
r
e
s
t
ing
h
e
a
de
r
:
X
-
P
OW
E
R
E
D
-
B
Y
:
P
HP/
7.
1.
11
[
32
m
[
+
]
[
0
m
XM
L
-
R
P
C
I
n
te
r
f
a
c
e
a
v
a
il
a
b
le
unde
r
:
h
tt
p
:/
/19
2.
168.
234.
1
:
8080
/wor
d
pr
e
s
s
/xm
lr
pc
.
p
h
p
[
33
m
[
!
]
[
0
m
I
n
c
lu
de
s
dir
e
c
tor
y
h
a
s
dir
e
c
tor
y
li
s
t
ing
e
n
a
b
l
e
d
:
htt
p
:
/
/192.
168.
234.
1
:
8
080/wo
r
dp
r
e
s
s
/wp
-
inc
lu
de
s
/
[
32
m
[
+
]
[
0
m
W
or
d
P
r
e
s
s
v
e
r
s
io
n
4.
9.
1
(
R
e
l
e
a
s
e
d
on
2017
-
11
-
29
)
i
de
n
t
if
ied
f
r
o
m
a
d
v
a
nc
e
d
f
ing
e
r
pr
int
ing
,
m
e
ta
g
e
n
e
r
a
t
or
,
li
nks
opml
,
s
t
yl
e
s
h
e
e
ts
nu
m
be
r
s
[
32
m
[
+
]
[
0
m
E
nu
m
e
r
a
t
ing
p
lugi
n
s
f
r
o
m
pa
s
s
iv
e
de
tec
t
i
o
n
.
.
.
[
32
m
[
+
]
[
0
m
No
p
lugi
n
s
f
o
und
[
32
m
[
+
]
[
0
m
E
nu
m
e
r
a
t
ing
u
s
e
r
n
a
m
e
s
.
.
.
[
32
m
[
+
]
[
0
m
I
de
nt
if
i
e
d
t
h
e
f
o
ll
ow
ing
1
u
s
e
r
/s
:
+
-
-
-
-
+
-
-
-
-
-
-
--
+
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
+
|
I
d
|
L
o
gin
|
Na
m
e
|
+
-
-
-
-
+
-
-
-
-
-
-
-
-
+
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
+
|
1
|
m
tt
li
m
|
m
@
tt
li
m
–
P
e
n
e
tr
a
t
io
n
T
e
s
t
ing
|
+
-
-
-
-
+
-
-
-
-
-
-
-
-
+
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
+
[
32
m
[
+
]
[
0
m
F
ini
s
h
e
d
:
T
hu
De
c
28
15
:
20
:
1
4
2017
[
32
m
[
+
]
[
0
m
R
e
q
ue
s
ts
Don
e
:
88
[
32
m
[
+
]
[
0
m
M
e
m
or
y
u
s
e
d
:
38.
707
M
B
[
32
m
[
+
]
[
0
m
E
l
a
ps
e
d
ti
m
e
:
00
:
00
:10
Fig
u
r
e
1
0
.
W
p
s
ca
n
lo
g
f
ile
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
5
0
2
-
4752
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci,
Vo
l.
12
,
No
.
2
,
No
v
e
m
b
er
2
0
1
8
:
7
2
9
–
7
3
7
736
Fig
u
r
e
1
1
.
T
h
e
m
o
s
t a
cc
es
s
ed
d
ir
ec
to
r
y
o
n
w
o
r
d
p
r
ess
attac
k
an
al
y
ze
d
u
s
i
n
g
d
ee
p
lo
g
an
al
y
ze
r
3.
4
.
WP
A2
a
t
t
a
ck
W
P
A
2
u
s
es
f
o
u
r
-
w
a
y
h
a
n
d
s
h
ak
es
to
co
m
m
u
n
icate
w
it
h
th
e
d
ev
ices.
Du
r
in
g
th
e
h
an
d
s
h
a
k
e
p
r
o
ce
s
s
,
th
e
A
P
an
d
t
h
e
d
ev
ice
ex
c
h
an
g
e
en
cr
y
p
ted
k
e
y
s
(
m
aster
k
e
y
an
d
tr
an
s
ien
t
k
e
y
)
to
ea
ch
o
t
h
er
.
I
n
o
r
d
er
to
s
teal
th
e
h
a
n
d
s
h
ak
e
b
et
w
ee
n
t
h
e
AP
an
d
co
n
n
ec
ted
d
ev
ice,
f
l
u
x
i
o
n
s
en
t
p
ac
k
ets
o
f
de
-
au
th
e
n
t
icatio
n
d
ata
to
th
e
co
n
n
ec
ted
d
ev
ice.
T
h
e
d
e
-
au
t
h
en
t
icatio
n
p
r
o
ce
s
s
ca
u
s
ed
th
e
co
n
n
ec
ted
d
ev
ice
to
d
is
co
n
n
ec
t
an
d
lo
s
e
t
h
e
ab
ilit
y
to
u
s
e
t
h
e
in
ter
n
et
f
r
o
m
t
h
e
co
n
n
ec
ted
A
P
.
T
h
en
t
h
e
co
n
n
ec
ted
d
ev
ice
w
ill
tr
y
to
co
n
n
ec
t
to
t
h
e
A
P
ag
ain
.
T
h
is
w
a
s
w
h
er
e
t
h
e
h
a
n
d
s
h
ak
e
s
b
et
w
ee
n
A
P
an
d
t
h
e
d
ev
ice
w
er
e
ca
p
tu
r
ed
as sh
o
w
n
in
Fi
g
u
r
e
.
1
2
.
Fig
u
r
e
1
2
.
De
-
au
t
h
e
n
ticatio
n
p
ac
k
ets
w
er
e
s
e
n
t to
th
e
co
n
n
ec
ted
d
ev
ice
Fig
u
r
e
1
3
d
is
p
la
y
ed
th
e
f
lu
x
io
n
ter
m
i
n
al
a
f
ter
t
h
e
r
ig
h
t p
ass
w
o
r
d
w
a
s
en
ter
ed
b
y
t
h
e
v
ic
ti
m
.
I
t c
an
b
e
o
b
s
er
v
ed
th
at
f
lu
x
io
n
d
id
s
u
cc
ess
f
u
l
l
y
d
i
s
co
v
er
ed
th
e
m
as
ter
k
e
y
a
n
d
t
h
e
tr
an
s
ien
t
k
e
y
o
f
t
h
e
A
P
.
As
s
tated
i
n
[
1
4
]
,
tr
an
s
ien
t
k
e
y
is
u
s
ed
to
p
r
o
tect
u
n
icast
co
m
m
u
n
icat
io
n
b
et
w
ee
n
th
e
A
P
an
d
th
e
d
ev
ices.
T
h
e
tr
an
s
ie
n
t
k
e
y
i
s
d
er
iv
ed
f
r
o
m
t
h
e
m
ast
er
k
e
y
,
a
f
i
x
ed
s
tr
i
n
g
,
t
h
e
M
AC
ad
d
r
ess
o
f
t
h
e
A
P
,
th
e
MA
C
ad
d
r
ess
o
f
t
h
e
clien
t,
an
d
t
w
o
r
an
d
o
m
n
u
m
b
er
s
.
Me
an
w
h
ile
th
e
m
a
s
ter
k
e
y
co
n
tai
n
s
co
n
ca
ten
at
io
n
o
f
t
h
e
p
ass
p
h
r
ase,
SS
I
D,
len
g
th
o
f
th
e
S
SID
,
a
n
d
b
it st
r
i
n
g
t
h
at
u
s
ed
o
n
l
y
o
n
ce
i
n
ea
ch
s
ess
io
n
.
Fig
u
r
e
1
3
.
Flu
x
io
n
s
cr
ee
n
s
h
o
t o
f
s
u
cc
e
s
s
f
u
l a
ttac
k
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
d
o
n
esia
n
J
E
lec
E
n
g
&
C
o
m
p
Sci
I
SS
N:
2502
-
4752
P
en
etra
tio
n
Tes
tin
g
u
s
in
g
K
a
l
i Lin
u
x:
S
QL I
n
jectio
n
,
X
S
S
,
W
o
r
d
p
r
es,
a
n
d
W
P
A
2
(
Ted
d
y
S
u
r
ya
Gu
n
a
w
a
n
)
737
T
h
is
r
esu
lt
ca
n
b
e
co
m
p
ar
ed
to
th
e
r
esu
l
t
o
f
W
P
A
attac
k
t
h
a
t
u
s
ed
d
ictio
n
ar
y
attac
k
as
d
e
m
o
n
s
tr
ated
in
[
6
]
.
T
h
e
au
th
o
r
s
u
s
ed
m
a
n
u
al
co
m
m
an
d
e
n
ter
ed
in
th
e
Ka
li
L
in
u
x
ter
m
in
al.
T
h
e
co
m
m
a
n
d
s
t
h
at
w
er
e
u
s
ed
ar
e
air
m
o
n
-
n
g
(
to
s
ca
n
t
h
e
W
i
-
Fi
n
et
w
o
r
k
a
v
ailab
le)
,
air
o
d
u
m
p
-
n
g
(
to
ca
p
tu
r
e
h
a
n
d
s
h
ak
es),
air
ep
lay
-
n
g
(
to
de
-
au
t
h
e
n
ticate
t
h
e
tar
g
et
W
i
-
Fi
n
et
w
o
r
k
)
an
d
air
cr
ac
k
-
n
g
(
t
o
cr
ac
k
th
e
p
ass
w
o
r
d
)
.
T
h
ey
u
s
ed
a
f
ile
co
n
tai
n
s
o
f
h
u
n
d
r
ed
s
o
f
w
o
r
d
lis
ts
to
cr
ac
k
t
h
e
p
as
s
w
o
r
d
w
h
ic
h
to
o
k
h
o
u
r
s
a
n
d
d
a
y
s
to
cr
ac
k
t
h
e
p
as
s
w
o
r
d
.
I
n
o
u
r
W
P
A
2
attac
h
e
x
p
er
i
m
e
n
t,
w
e
u
s
ed
a
n
a
u
to
m
ated
s
cr
i
p
ted
to
o
l
to
h
ac
k
t
h
e
W
i
-
Fi
n
e
t
w
o
r
k
.
T
h
e
p
r
o
ce
s
s
u
s
i
n
g
f
l
u
x
io
n
to
o
l
w
as e
as
ier
an
d
co
n
s
u
m
e
le
s
s
ti
m
e
as
w
e
ll.
4.
CO
NCLU
SI
O
N
AND
F
U
T
U
RE
WO
RK
S
I
n
co
n
cl
u
s
io
n
,
t
h
e
w
eb
s
er
v
er
h
as
b
ee
n
p
e
n
etr
ated
b
y
s
i
m
u
lati
n
g
th
e
SQ
L
in
j
ec
tio
n
,
XSS,
a
n
d
W
o
r
d
P
r
ess
attac
k
.
I
n
S
QL
in
j
ec
tio
n
s
,
t
h
e
w
eb
s
er
v
er
w
a
s
ex
p
lo
ited
w
it
h
s
q
l
m
ap
to
o
l
w
i
th
ad
d
itio
n
o
f
u
s
ag
e
o
f
B
u
r
p
Su
ite.
An
i
n
p
u
t
w
as
e
n
t
er
ed
in
to
th
e
w
eb
s
ite
a
n
d
in
te
r
ce
p
ted
b
y
t
h
e
B
u
r
p
S
u
ite.
B
y
m
an
ip
u
lati
n
g
t
h
e
in
f
o
r
m
atio
n
i
n
ter
ce
p
ted
in
B
u
r
p
Su
ite,
HT
T
P
GE
T
r
eq
u
est
a
n
d
co
o
k
ies
h
ad
b
ee
n
m
an
ag
ed
to
ca
p
tu
r
e.
T
h
e
n
HT
T
P
GE
T
r
eq
u
est
an
d
co
o
k
ies
w
er
e
u
s
ed
to
in
s
q
l
m
a
p
to
o
l
to
en
u
m
er
ate
t
h
e
co
n
ten
t
o
f
th
e
w
eb
s
er
v
er
.
I
n
XSS
attac
k
,
a
f
u
r
th
er
s
tep
tak
en
i
n
w
h
ich
t
h
e
attac
k
n
o
t
o
n
l
y
m
a
n
a
g
ed
to
ex
p
lo
it
th
e
w
eb
s
er
v
er
o
f
t
h
e
v
icti
m
,
b
u
t
it
a
ls
o
m
an
a
g
ed
to
ex
p
lo
it
a
n
d
g
ai
n
r
e
m
o
te
ac
ce
s
s
o
n
t
h
e
v
icti
m
’
s
m
a
ch
in
e.
Me
an
w
h
ile,
in
W
o
r
d
P
r
ess
attac
k
,
th
e
atta
ck
o
n
l
y
f
o
c
u
s
ed
i
n
g
etti
n
g
t
h
e
u
s
er
n
a
m
e
o
f
th
e
W
o
r
d
P
r
e
s
s
ac
co
u
n
t.
I
n
th
e
m
ea
n
ti
m
e,
o
n
f
ir
e
w
a
ll
attac
k
,
w
e
m
a
n
ag
ed
to
ca
p
tu
r
e
th
e
h
a
n
d
s
h
a
k
e
s
o
f
t
h
e
tar
g
et
W
i
-
Fi
n
et
w
o
r
k
,
w
h
ic
h
la
ter
b
e
u
s
ed
i
n
cr
ea
ti
n
g
r
o
g
u
e
A
P
an
d
cr
ac
k
in
g
th
e
p
ass
w
o
r
d
.
T
h
e
p
ass
w
o
r
d
w
a
s
o
b
tai
n
ed
f
r
o
m
th
e
f
ak
e
lo
g
i
n
p
ag
e
cr
ea
ted
.
T
h
e
p
ass
w
o
r
d
th
en
m
atc
h
ed
w
ith
t
h
e
m
a
s
ter
k
e
y
w
h
ic
h
o
b
tain
ed
f
r
o
m
t
h
e
h
an
d
s
h
a
k
e
s
ca
p
tu
r
ed
ea
r
lier
.
Fu
tu
r
e
r
esear
ch
i
n
cl
u
d
es
ev
alu
at
io
n
o
f
o
th
er
attac
k
s
,
d
ee
p
an
al
y
s
i
s
o
n
th
e
lo
g
f
i
les,
an
d
p
r
ev
en
ti
v
e
m
ea
s
u
r
e
to
o
v
er
co
m
e
th
e
attac
k
s
.
ACK
NO
WL
E
D
G
E
M
E
NT
S
T
h
e
r
esear
ch
er
s
i
n
th
is
s
t
u
d
y
w
o
u
ld
li
k
e
to
ac
k
n
o
w
led
g
e
th
e
I
n
ter
n
atio
n
a
l
I
s
la
m
ic
Un
i
v
er
s
it
y
Ma
la
y
s
ia
(
I
I
UM
)
f
o
r
th
e
f
in
a
n
cial
f
u
n
d
in
g
o
f
t
h
is
r
esear
c
h
th
r
o
u
g
h
t
h
e
R
e
s
ea
r
ch
I
n
itiat
i
v
es
Gr
an
t
Sc
h
e
m
e
(
R
I
GS)
R
I
GS1
5
-
070
-
0070.
RE
F
E
R
E
NC
E
S
[1
]
P
.
S
.
S
h
in
d
e
a
n
d
S
.
B.
A
rd
h
a
p
u
rk
a
r,
"
C
y
b
e
r
se
c
u
rit
y
a
n
a
l
y
sis
u
sin
g
v
u
l
n
e
ra
b
il
it
y
a
ss
e
ss
m
e
n
t
a
n
d
p
e
n
e
trati
o
n
tes
ti
n
g
,
"
in
F
u
t
u
risti
c
T
re
n
d
s
i
n
R
e
se
a
rc
h
a
n
d
In
n
o
v
a
ti
o
n
f
o
r
S
o
c
ial
W
e
l
f
a
re
(S
tartu
p
Co
n
c
lav
e
),
W
o
rld
Co
n
f
e
re
n
c
e
o
n
,
p
p
.
1
-
5
,
2
0
1
6
.
[2
]
W
.
G
.
Ha
l
f
o
n
d
,
J.
V
ieg
a
s,
a
n
d
A
.
Ors
o
,
"
A
c
las
si
f
ica
ti
o
n
o
f
S
QL
-
in
jec
ti
o
n
a
tt
a
c
k
s
a
n
d
c
o
u
n
t
e
r
m
e
a
su
re
s,
"
in
P
r
o
c
e
e
d
in
g
s o
f
th
e
IEE
E
In
tern
a
ti
o
n
a
l
S
y
m
p
o
siu
m
o
n
S
e
c
u
re
S
o
f
twa
re
En
g
in
e
e
rin
g
,
p
p
.
1
3
-
1
5
,
2
0
0
6
.
[3
]
D.
A
p
p
e
lt
,
C.
D.
Ng
u
y
e
n
,
L
.
C.
Brian
d
,
a
n
d
N.
A
lsh
a
h
w
a
n
,
"
A
u
to
m
a
ted
tes
ti
n
g
f
o
r
S
QL
in
jec
ti
o
n
v
u
ln
e
ra
b
il
it
ies
:
a
n
in
p
u
t
m
u
tatio
n
a
p
p
ro
a
c
h
,
"
i
n
P
ro
c
e
e
d
in
g
s
o
f
th
e
2
0
1
4
I
n
tern
a
ti
o
n
a
l
S
y
m
p
o
siu
m
o
n
S
o
f
t
w
a
re
T
e
stin
g
a
n
d
A
n
a
l
y
sis,
p
p
.
2
5
9
-
2
6
9
,
2
0
1
4
.
[4
]
M
.
D.
Am
b
e
d
k
a
r,
N.
S
.
Am
b
e
d
k
a
r,
a
n
d
R.
S
.
Ra
w
,
"
A
c
o
m
p
re
h
e
n
siv
e
in
sp
e
c
ti
o
n
o
f
c
ro
ss
site
sc
rip
ti
n
g
a
tt
a
c
k
,
"
in
Co
m
p
u
ti
n
g
,
Co
m
m
u
n
ica
ti
o
n
a
n
d
A
u
to
m
a
ti
o
n
(ICCCA
),
2
0
1
6
I
n
ter
n
a
ti
o
n
a
l
Co
n
f
e
re
n
c
e
o
n
,
p
p
.
4
9
7
-
5
0
2
,
2
0
1
6
.
[5
]
A
.
K.
K
y
a
w
,
F
.
S
io
q
u
im
,
a
n
d
J.
Jo
se
p
h
,
"
Dic
ti
o
n
a
ry
a
tt
a
c
k
o
n
W
o
rd
p
re
ss
:
S
e
c
u
rit
y
a
n
d
f
o
re
n
sic
a
n
a
l
y
sis,"
in
In
f
o
rm
a
ti
o
n
S
e
c
u
ri
ty
a
n
d
Cy
b
e
r
F
o
re
n
sic
s (In
f
o
S
e
c
),
2
0
1
5
S
e
c
o
n
d
I
n
tern
a
ti
o
n
a
l
Co
n
f
e
re
n
c
e
o
n
,
p
p
.
1
5
8
-
1
6
4
,
2
0
1
5
.
[6
]
M
.
De
n
is,
C.
Zen
a
,
a
n
d
T
.
Ha
y
a
jn
e
h
,
"
P
e
n
e
trati
o
n
tes
ti
n
g
:
Co
n
c
e
p
ts,
a
tt
a
c
k
m
e
th
o
d
s,
a
n
d
d
e
f
e
n
se
stra
teg
ies
,
"
in
S
y
st
e
m
s,
A
p
p
li
c
a
ti
o
n
s a
n
d
T
e
c
h
n
o
lo
g
y
Co
n
f
e
re
n
c
e
(
L
IS
A
T
),
2
0
1
6
IEE
E
L
o
n
g
Isla
n
d
,
p
p
.
1
-
6
,
2
0
1
6
.
[7
]
L
.
A
ll
e
n
,
T
.
He
ri
y
a
n
to
,
a
n
d
S
.
A
li
,
Ka
li
L
in
u
x
–
Assu
ri
n
g
se
c
u
rit
y
b
y
p
e
n
e
tra
ti
o
n
tes
ti
n
g
,
P
a
c
k
t
P
u
b
li
s
h
in
g
L
td
,
2
0
1
4
.
[8
]
C.
P
.
S
c
h
u
l
tz an
d
B
.
P
e
rc
iac
c
a
n
te,
Ka
li
L
in
u
x
Co
o
k
b
o
o
k
,
P
a
c
k
t
P
u
b
l
ish
in
g
L
td
,
2
0
1
7
.
[9
]
T
.
S
.
G
u
n
a
wa
n
,
M
.
K.
L
im
,
N.
F
.
Zu
lk
u
r
n
a
in
,
a
n
d
M
.
Ka
rti
w
i,
"
On
th
e
Re
v
iew
a
n
d
S
e
tu
p
o
f
S
e
c
u
r
it
y
A
u
d
it
u
sin
g
K
a
li
L
in
u
x
,
"
In
d
o
n
e
sia
n
J
o
u
r
n
a
l
o
f
El
e
c
trica
l
En
g
in
e
e
rin
g
a
n
d
Co
mp
u
ter
S
c
ien
c
e
,
v
o
l
.
1
1
,
p
p
.
5
1
-
5
9
,
2
0
1
8
.
[1
0
]
R.
P
.
Ka
ru
p
a
rt
h
i
a
n
d
B
.
Z
h
o
u
,
"
En
h
a
n
c
e
d
A
p
p
ro
a
c
h
to
De
tec
ti
o
n
o
f
S
QL
In
jec
ti
o
n
A
tt
a
c
k
,
"
in
M
a
c
h
in
e
L
e
a
rn
in
g
a
n
d
A
p
p
li
c
a
ti
o
n
s (ICM
L
A
),
2
0
1
6
1
5
t
h
IE
EE
In
tern
a
ti
o
n
a
l
Co
n
f
e
re
n
c
e
o
n
,
p
p
.
4
6
6
-
4
6
9
,
2
0
1
6
.
[1
1
]
W
3
T
e
c
h
s,
"
Us
a
g
e
o
f
Co
n
ten
t
M
a
n
a
g
e
m
e
n
t
S
y
ste
m
s
f
o
r
W
e
b
sites
,
"
[h
tt
p
s:/
/w
3
tec
h
s.co
m
/t
e
c
h
n
o
lo
g
ies
/o
v
e
rv
ie
w
/co
n
ten
t_
m
a
n
a
g
e
m
e
n
t/
a
ll
]
,
Re
tri
e
v
e
d
o
n
:
7
J
u
n
e
2
0
1
8
.
[1
2
]
M
.
V
a
n
h
o
e
f
a
n
d
F
.
P
ies
se
n
s,
"
P
re
d
ictin
g
,
De
c
ry
p
ti
n
g
,
a
n
d
A
b
u
sin
g
W
P
A
2
/8
0
2
.
1
1
G
ro
u
p
Ke
y
s,"
in
USE
NI
X
S
e
c
u
rit
y
S
y
m
p
o
siu
m
,
p
p
.
6
7
3
-
6
8
8
,
2
0
1
6
.
[1
3
]
D.
A
l
a
m
,
M
.
A
.
K
a
b
ir,
T
.
Bh
u
iy
a
n
,
a
n
d
T
.
F
a
ra
h
,
"
A
Ca
se
S
tu
d
y
o
f
S
Q
L
In
jec
ti
o
n
V
u
ln
e
ra
b
il
it
ies
A
s
se
ss
m
e
n
t
o
f
.
b
d
Do
m
a
in
W
e
b
A
p
p
li
c
a
ti
o
n
s,"
in
Cy
b
e
r
S
e
c
u
rit
y
,
C
y
b
e
r
W
a
r
f
a
re
,
a
n
d
Dig
it
a
l
F
o
re
n
sic
(Cy
b
e
rS
e
c
),
2
0
1
5
F
o
u
rth
In
tern
a
ti
o
n
a
l
C
o
n
f
e
re
n
c
e
o
n
,
p
p
.
7
3
-
7
7
,
2
0
1
5
.
[1
4
]
I.
M
a
v
rid
is,
A
.
-
I.
A
n
d
ro
u
lak
is,
A
.
H
a
lk
ias
,
a
n
d
P
.
M
y
lo
n
a
s,
"
R
e
a
l
-
li
f
e
p
a
ra
d
ig
m
s
o
f
w
irel
e
ss
n
e
tw
o
rk
se
c
u
rit
y
a
tt
a
c
k
s,
"
in
In
f
o
rm
a
ti
c
s (P
C
I),
2
0
1
1
1
5
t
h
P
a
n
h
e
ll
e
n
ic Co
n
f
e
re
n
c
e
o
n
,
p
p
.
1
1
2
-
1
1
6
,
2
0
1
1
.
Evaluation Warning : The document was created with Spire.PDF for Python.