To search, Click below search items.


All Published Papers Search Service


Using SQLMAP to Detect SQLI Vulnerabilities


Waad Almadhy, Amal Alruwaili, and Saloua Hendaoui


Vol. 22  No. 1  pp. 234-240


One of the most discussed topics is cyber security when it comes to web application and how to protect it and protect databases. One of the most widely used and widespread techniques is SQLI, and it is used by hackers and hackers. In this research, we touched on the concept of SQLI and what are its different types, and then we detected a SQLI vulnerability in a website using SQLMAP. Finally, we mentioned different ways to avoid and protect against SQLI.


cybersecurity, SQLMAP, SQLI, Vulnerability, Web Application Attacks.