Tag: SQL Injection 6 resultados

Optimized Blind MySQL Injection Data Retrieval

Demonstrates a method to extract data from a MySQL database using blind injection in fewer requests than currently known techniques such as the Bisection and Bit Shift method.

Posted on Mar 31, 2011 by Roberto Salgado  |  tags: MySQL Database SQL Injection Blind Injection

Read full story»

Bypassing Web Application Firewalls with SQLMap Tamper Scripts

An introduction to SQLMap's new tamper scripts and how they can be used to bypass Web Application Firewalls and Intrusion Detection Systems.

Posted on Aug 26, 2011 by Roberto Salgado  |  tags: SQL Injection SQLMap Tamper Scripts WAF Firewall

Read full story»

Solutions for challenge 2A

A detailed explanation of the SQL Injection challenge 2A and the many solutions used to solve this challenge.

Posted on Jul 12, 2012 by Roberto Salgado  |  tags: SQL Injection solutions challenge 2A

Read full story»

Solutions for challenge 2B

A detailed explanation of the SQL Injection challenge 2B and the many solutions used to solve this challenge.

Posted on Aug 16, 2012 by Roberto Salgado  |  tags: SQL Injection solutions challenge 2B

Read full story»

Solutions for challenges 3A and 3B

A write-up of the SQL Injection challenges 3A and 3B with the many solutions used to solve these challenges.

Posted on Sep 20, 2012 by Roberto Salgado  |  tags: SQL Injection solutions challenge 3A 3B

Read full story»

Presentation on Optimization and Obfuscation Techniques for SQL Injections

A couple years ago Roberto Salgado had the honor of presenting his research on SQL Injections at several conferences. Just recently, Blackhat released the video of his presentation. This post contains the link to Roberto's slides and video.

Latest Blog Entries

Downloading an Application's Entire Source Code Through an Exposed GIT Directory
Website administrators sometimes inadvertently leave an exposed .git directory, from which it is possible to download the entire source code of the web application using just wget and a common server misconfiguration.

credmap: The Credential Mapper
An overview of credmap, an open source penetration testing tool that automates the process of testing for credential reuse. It does so by testing supplied user credentials on known websites and verifies if the password has been reused on any of these.

New publication: Mastering the Nmap Scripting Engine
We invite you to learn more about the latest publication from our team, "Mastering the Nmap Scripting Engine".

Latest News

Blackhat EU 2015
Websec participated with two tools at the Blackhat, EU Arsenal held in Amsterdam, NL from the 10-13 of November, 2015. During this event, we introduced our brand new tool "credmap: The Credential Mapper" and also presented an amped-up version of Panoptic.

BSides Vancouver 2015
Websec is proud to announce that we will be attending the 3rd annual edition of BSides Vancouver, a local non-profit information security conference held in the heart of Vancouver, BC on March 16 and 17.