Cenzic 232 Patent
Paid Advertising
sla.ckers.org is
ha.ckers sla.cking
Sla.ckers.org
How do you completely compromise a machine given a text box or badly validated input box? This is a place to talk about code issues (PHP includes, null byte injection, backticks, pipe, etc...) as well as how to properly construct an SQL injection attack. 

Current Page: 1 of 1
Results 1 - 9 of 9
5 months ago
notsosecure
Learn advanced techniques in SQL Injection as well as some lesser known injection flaws such as LDAP Injection, Hibernate Query Language Injection, XPATH Injection, XML External Entity Injection, Direct Code injection etc. All attendees will receive FREE access to on-line labs related to the class. http://blackhat.com/us-14/training/the-art-of-exploiting-injection-flaws.html
Forum: SQL and Code Injection
11 months ago
notsosecure
Dear All, We are really happy to announce the release of our SQL Injection Labs! SQL Injection Labs provides an on-line platform to master The Art of Exploiting SQL Injection. From SQLi 101 to mind bending 2nd order injection, file read/write access, remote code execution; we have got it all covered. Whether you are a student who is just starting a career in field of IT security or a pro
Forum: SQL and Code Injection
1 year ago
notsosecure
I am delighted to announce that the course 'The Art of Exploiting Injection Flaws' has been selected to run at *ALL* leading IT security events around the world. These are: Black Hat Las Vegas July 29th-30th BruCon (Belgium) September 24th-25th HITB (Malaysia) October 14th and 15th Ruxcon (Melbourne, Australia) October 22nd-23rd Appsec (NYC, USA) Nov 18th-19th The 2 day hands-on course t
Forum: SQL and Code Injection
1 year ago
notsosecure
The popular course on Injection Flaws will return to Las Vegas at Black hat 2013. More details can be found here: https://www.blackhat.com/us-13/training/the-art-of-exploiting-injection-flaws.html Some of the new additions to the course are: Oracle SQLI- how to execute OS code, how to do priv esc from web app, OOB extraction. Examples of burp pro missing SQLI. Injection in order by/gr
Forum: SQL and Code Injection
2 years ago
notsosecure
a little sneak preview: can you spot the problem here: http://pastebin.com/h4M5xVjT does your favourite SQLI tool know how to exploit this? Thanks Sid
Forum: SQL and Code Injection
2 years ago
notsosecure
A few seats still left in the course. The course has been completely re-written and contains only relevant/advanced instances/examples. Such as: SQLI in orderby, group by etc SQL in stored procedures double encoding/decoding GBK and other encoding Injection in cookies, headers OS code exec by UDF Injection 2nd order injection and loads more.. http://blackhat.com/html/bh-us-12/tra
Forum: SQL and Code Injection
2 years ago
notsosecure
Hello All, Still a few seats left on the Advanced SQL Injection course at Black Hat. The course details and registration page can be found here: https://www.blackhat.com/html/bh-us-12/training/courses/bh-us-12-training_exploiting-sql-injection.html There is a small video preview here: http://www.youtube.com/watch?v=6pg-lRv8XTQ Identify, extract, escalate, execute; we have got it
Forum: SQL and Code Injection
2 years ago
notsosecure
There are still a few seats left in the upcoming course on exploiting injection flaws at Appsec DC. The course will take place on April 2nd and 3rd. The abstract of the course is: OWASP rates injection flaws as the most critical vulnerability within the Top 10 most Critical Web Application Security Risks under the OWASP Top 10 project. http://www.owasp.org/index.php/Top_10_2010-A1. This hand
Forum: SQL and Code Injection
2 years ago
notsosecure
Hello All, This year at Black Hat Las vegas, I will be hosting a 1 day training course on the most popular web app hacking technique 'SQL Injection'. Here is the abstract of the course: "This is a full day hands on training course which will typically target penetration testers, security auditors/administrators and web developers to learn advanced exploitation techniques. SQL Injecti
Forum: SQL and Code Injection
Current Page: 1 of 1