AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
![]() User inputs are key indicators of injection attacks. ![]() Depending on the nature of your web application, there are various techniques you can implement to prevent attacks. During a recent test, I ran into a curious SQL injection vulnerability that required some old but still valid tricks to bypass certain restrictions, and then some imagination to fully exploit it and get command execution on the vulnerable server.įirst off, identifying the SQL injection was trivial, our good old friend, the single quote, helped me with this. Preventing injection attacks requires coding your web application securely so that it can’t be easily manipulated.
0 Comments
Read More
Leave a Reply. |