SQL injection

Results: 397



#Item
131Relational database management systems / Database management systems / Query languages / SQL / SQL injection / Microsoft SQL Server / Stored procedure / Insert / Select / Data management / Computing / Software

Advanced SQL injection to operating system full control Bernardo Damele Assumpção Guimarães April 10, 2009

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:29
132Computer network security / Malware / Password / Computer insecurity / SQL injection / Denial-of-service attack / Vulnerability / Advanced persistent threat / Social engineering / Cyberwarfare / Computer security / Security

Defence AgainstTerrorism Terrorism Review Defence Against Review

Add to Reading List

Source URL: www.tmmm.tsk.tr

Language: English - Date: 2015-02-23 10:34:30
133Data / Relational database management systems / Query languages / Database management systems / SQL injection / Microsoft SQL Server / Select / Stored procedure / Book:Databases / Data management / SQL / Computing

Advanced SQL injection to operating system full control Bernardo Damele Assumpção Guimarães Black Hat Briefings Europe Amsterdam (NL) – April 16, 2009

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:29
134SQL injection / MongoDB / BSON / NoSQL / SQL / Document-oriented database / Penetration test / JSON / Data management / Computing / Data

(in)Secure code, Exploits and mitigation AngularJS and MongoDB Israel Chorzevski Tech leader, AppSec Labs

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2014-09-09 03:51:21
135Software testing / Computing / Computer network security / Attack patterns / Vulnerability / Application security / Exploit / Buffer overflow / SQL injection / Cyberwarfare / Computer security / Hacking

Attack Patterns as a Knowledge Resource for Building Secure Software Sean Barnum Amit Sethi

Add to Reading List

Source URL: capec.mitre.org

Language: English - Date: 2007-03-13 14:59:22
136Data / Relational database management systems / Subroutines / PL/SQL / SQL injection / User-defined function / Insert / Oracle Database / Select / Data management / SQL / Computing

Advanced SQL Injection in Oracle databases Esteban Martínez Fayó February 2005

Add to Reading List

Source URL: www.orkspace.net

Language: English - Date: 2007-12-06 12:59:24
137Security / Software testing / OWASP / Penetration test / Logic / SQL injection / Computer network security / Computer security / Cyberwarfare

The Art of Exploiting Logical Flaws in Web Apps Sumit “sid” Siddharth Richard “deanx” Dean A GREAT COLLABORATION!

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-12-06 13:14:23
138Database management systems / SQL / Data / Query languages / Microsoft SQL Server / Windows Server System / Stored procedure / Database Console Commands / SQL injection / Data management / Computing / Relational database management systems

SQL SERVER Anti-Forensics Cesar Cerrudo Introduction

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:23
139Data / Relational database management systems / Database management systems / Subroutines / SQL injection / Stored procedure / Vulnerability / Code injection / Magic quotes / Data management / Computing / SQL

VISA Europe SQL Injection Attacks Data has become the preferred currency of today’s card criminals. Their aim is to obtain sensitive personal and account data. And, with so many online retailers routinely collecting an

Add to Reading List

Source URL: www.visaeurope.com

Language: English - Date: 2015-04-29 08:10:45
140McAfee / Computer network security / Companies listed on the New York Stock Exchange / Password / Database security / SQL injection / Vulnerability / Oracle Corporation / Oracle Database / Computer security / Cyberwarfare / Security

Data Sheet McAfee Vulnerability Manager for Databases A comprehensive assessment of the risk to your most sensitive data You store your most valuable and sensitive data in a database, but most vulnerability

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:53:28
UPDATE