Tech Articles

SQL Injection Prevention – A Practical Approach

SQL injection is a technique, used to attack data-driven applications. Using this method, hackers will try to execute their SQL statements within your application and access your database data. Here is an example SQL injection. Let’s consider you have a login form with two fields – username (text field) and password (password field). Upon login, […]

Tech Articles

Mitigations for Common Web Application Flaws

The most prominent components of web applications that intruders will first seek to exploit are vulnerabilities within the web platform. The web platform commonly includes: Web server software (such as IIS or Apache). Extensions to the web server, such as ISAPI filters and extensions, or Apache modules. Dynamic execution environments like ASP.NET, PHP, and J2EE […]

Tutorials

Live SQL Injection Exploitation with SQLMap – A Detailed Guide

Hello geeks, today we’ll show you some basic SQL Injection techniques with the help of Python and SQLMap. SQL injection is one of the most critical vulnerabilities till now and is still included in the OWASP Top 10 list’s Injection flaws section. Sqlmap is one of the most popular automated SQL Injection exploitation tool which can […]

Tutorials

Scan SQL Injection vulnerability on whole server

SQL injection occurs when an application processes user-provided data to create an SQL statement without first validating the input and then submits the statement to a database server for execution. When successfully exploited, SQL injection can give an attacker the means to access back-end database content, remotely execute system commands and in some circumstances, take control of the server that is hosting […]