About bar code xss/SQL inj, etc.

Source: Internet
Author: User

Cosine Function

I have seen several articles written in foreign countries. I still have a Paper. I forgot where to put it.

And then see the ghost: http://www.bkjia.com/Article/201003/45234.html
Mr_xhming of: http://www.bkjia.com/Article/201003/45216.html

I have already described the application of bar code attacks in the xeye group some time ago.

To be honest, there is almost no novelty except the bar code itself. The input here is the bar code reader. The entered content is a bar code, which is then decoded on the backend (within the computer.

What kind of attacks will this cause? Because there are a lot of logistics management systems, including those in supermarkets (the reader who clicks the bar code label). If the backend uses web management, the decoded bar code content may be output due to poor filtering, resulting in xss attacks. Backend management generally involves databases, and the input content should be the decoded content of the bar code. Therefore, SQL injection may occur.

Here we can use the bar code as an encryption method. The encrypted content is these xss/SQL inj segments.

However, such an attack is flawed, such as the length limit of one-dimensional bar code input, and I don't know how to effectively launch such an attack in reality, except for moles... for example:



But we still don't see the actual attack, and there is a generator:



In logistics management, if a passive RFID is used to replace the bar code, the RFID xss/SQL inj may also appear, but RFID is unlikely to replace the bar code unless the price is very low ......

As an input point, RFID attacks will be much cooler, and there should be more opportunities!

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.