Main Article Content
This paper presents a new method to protect the applications against NoSQL injection. NoSQL-Injection Attacks are a class of attacks that many of these systems are highly vulnerable to, and there is no known fool-proof defense against various attacks. Despite all vulnerabilities, two factor authentications remain the safest way to protect user accounts in traditional web apps. Two bypasses of factor authentication can occur from time to time, with various techniques involved in those attacks; the only way to do this is to maintain an iteration of one's approach to two authentication factor tests
TURCOMAT publishes articles under the Creative Commons Attribution 4.0 International License (CC BY 4.0). This licensing allows for any use of the work, provided the original author(s) and source are credited, thereby facilitating the free exchange and use of research for the advancement of knowledge.
Detailed Licensing Terms
Attribution (BY): Users must give appropriate credit, provide a link to the license, and indicate if changes were made. Users may do so in any reasonable manner, but not in any way that suggests the licensor endorses them or their use.
No Additional Restrictions: Users may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.