exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 76 RSS Feed

Files

Database Security Threats And Injection Technique
Posted Jun 19, 2018
Authored by darklight

Whitepaper called Database Security Threats and Injection Technique. Written in Persian.

tags | paper
SHA-256 | 5d18ecda87e677b9be4fcc471c55096e2eefcceb48e70cc55ca0ed8b6636b300
MySQL UDF Exploitation
Posted Feb 17, 2018
Authored by Osanda Malith

Whitepaper called MySQL UDF Exploitation.

tags | paper
SHA-256 | e3f1baa170d27afb7c63c85824246d5dacb72df1f9b55d3c574624348aab3380
Injecting SQLite Database-Based Application
Posted Feb 19, 2017
Authored by Manish Tanwar

This is a whitepaper that discusses leveraging SQL injection attacks against SQLite databases.

tags | paper, sql injection
SHA-256 | 2d25bf7c68c93856be515e7d7f9ce1c5e31d0ff0e1c4c03ba1d67a61f385507e
MySQL Error Based SQL Injection Using EXP
Posted Aug 22, 2015
Authored by Osanda Malith

This paper discusses an overflow in the DOUBLE data type in MySQL.

tags | paper, overflow
SHA-256 | 994da41348fedec81430a33635725f5ef5bf21eaded32a286053dfd2938cf982
Inside The Mind Of Oracle's Mary Ann Davidson
Posted Aug 11, 2015
Authored by Mary Ann Davidson

This is a public blog posted by Oracle's CSO Mary Ann Davidson. It provides a rare glimpse into the corporate mindframe reminding us all that license agreements are always respected by hostile parties and therefore security researchers should not even consider reverse engineering Oracle's code base. As has been proven time and again, Oracle's bullet proof unbreakable security does not need public vetting and they consistently can identify and address all issues without your needless meddling.

tags | paper
SHA-256 | d16deebdad2785cf38a42eaa182a2fd03f6976eacc830f7b05b1f5489393b40f
Pentesting Microsoft SQL Server
Posted Mar 4, 2015
Authored by Halil Dalabasmaz

Whitepaper discussing penetration and security testing against Microsoft SQL Server. Written in Turkish.

tags | paper, sql injection
SHA-256 | dc6404d93aa87f8467a2c37aca466c0c947bae3530334eb4dd8b112aa3850d18
SQLMap ile CSRF Bypass
Posted Jul 29, 2014
Authored by Ibrahim Balic

This whitepaper discusses hacking with sqlmap and leveraging cross site request forgery vulnerabilities. Written in Turkish.

tags | paper, vulnerability, csrf
SHA-256 | 7130a96bfe8e601c63c6db831c76a47578959bc3aa160183ca7c39ba4c380efd
DBMS_XMLSTORE As An Auxiliary SQL Injection Function In Oracle 12c
Posted Jul 22, 2014
Authored by David Litchfield

The ability to execute arbitrary SQL on Oracle via a SQL injection flaw is hampered by the fact that the Oracle RDBMS will not batch multiple queries. Typically, a low privileged attacker with say only the CREATE SESSION privilege, must find a function they can inject that will allow them to execute a block of anonymous PL/SQL. These are known as auxiliary inject functions. Depending upon the version of Oracle and what components are installed auxiliary inject functions may be few and far between. For example, on Oracle 12c with the internal Java VM removed, there may be none. Indeed, during a recent client assessment the author of this paper was confronted with such a situation: a PL/SQL injection flaw but with no easy method for easy exploitation to gain full control of the database server. This paper presents a method around such a problem using DBMS_XMLSTORE and, co-incidentally, DBMS_XMLSAVE. This method can be used in web-based SQL injection attacks, as well.

tags | paper, java, web, arbitrary, sql injection
SHA-256 | 42373a43d60cc25c4d8fb1e06e905e8adafeae668b2a402d7121f1232ab9d611
Oracle Data Redaction Is Broken
Posted Jul 16, 2014
Authored by David Litchfield

Oracle data redaction is a simple but clever and innovative idea from Oracle. However, at present, there are weaknesses that undermine its effectiveness as a good security mechanism. These weaknesses can be exploited via web based SQL injection attacks and this paper details those weaknesses and provides suggestions on how it can be improved and made more secure.

tags | paper, web, sql injection
SHA-256 | 8cb488d94f0f24c541295b45894955646b915f06b2bd3f2038f2c4e7aac4422f
Oracle SID Detection Techniques Part 4
Posted Jun 15, 2014
Authored by Ali Abbasi

Whitepaper called Oracle SID Detection Techniques - Part 1. Written in Persian.

tags | paper
SHA-256 | 216902657ee1a360c1b1d862f34bf7cec694092990536e667eff806c67124f16
Oracle SID Detection Techniques Part 3
Posted Jun 15, 2014
Authored by Ali Abbasi

Whitepaper called Oracle SID Detection Techniques - Part 3. Written in Persian.

tags | paper
SHA-256 | 99d5fc68bd7f308a7fb0286580dfe9fb08fa67f54a4512ba6fc79242096c12a4
Oracle SID Detection Techniques Part 2
Posted Jun 15, 2014
Authored by Ali Abbasi

Whitepaper called Oracle SID Detection Techniques - Part 2. Written in Persian.

tags | paper
SHA-256 | dce6b5307b6f20bb7d98b49054356d04c564fab5330fc55d8943a23c414fdf59
Oracle SID Detection Techniques Part 1
Posted Jun 15, 2014
Authored by Ali Abbasi

Whitepaper called Oracle SID Detection Techniques - Part 1. Written in Persian.

tags | paper
SHA-256 | b840fcc9f91bdcdd628bf96a2b8007f515b3578cf72d2146034d794c32e08817
SQL Injection In Insert, Update, And Delete
Posted May 7, 2014
Authored by Osanda Malith

This is a brief whitepaper that goes over different payloads that can be leveraged in SQL injection attacks.

tags | paper, sql injection
SHA-256 | 9499be52d5cfed9d72ecaf10bc20f2276bb6bc14fd6d1eb70d8afca6916fdf70
Exploitation Of MS-SQL Servers Explained
Posted Nov 26, 2012
Authored by Agd_Scorp

Whitepaper called Exploitation of MS-SQL Servers Explained. Written in Turkish.

tags | paper
SHA-256 | 4ffc2985fa1f3d4996dafdb8b9f4aeb73a2c9f7d902970dcdd4e16f2f7207a9d
Indexed Blind SQL Injection
Posted Dec 3, 2011
Authored by gamma95

Whitepaper called Indexed Blind SQL Injection. Time based blind SQL attacks suffer from low bit/request ratios. Each request produces only one valuable bit of information. This paper describes a tweak that produces higher yield at the expense of a longer runtime. Along the way, some issues and notes of applicability are also discussed.

tags | paper, sql injection
SHA-256 | 84e74daa46ea6185f1c1f4ee9764bc2315f2a4cf39e46f8dfcea99039a5ecb21
Blind SQL Injection With Regular Expressions Attack
Posted Jun 13, 2011
Authored by IHTeam, white_sheep | Site ihteam.net

Whitepaper called Blind SQL Injection with Regular Expressions Attack.

tags | paper, sql injection
SHA-256 | 167010ab38c65a1b629b2eb5767870004cb391e155573d9cd652fbf5476b540f
Advanced MySQL Exploitation
Posted Jan 10, 2011
Authored by Muhaimin Dzulfakar

Whitepaper called Advanced MySQL Exploitation.

tags | paper
SHA-256 | eeed1189d006c0343e26e681e5c40d6acc19a93e76346607fc677f073a104192
Tutorial Blind SQL Injection Referensi
Posted Nov 8, 2010
Authored by jos_ali_joe

Whitepaper called Tutorial Blind SQL Injection Referensi. Written in Indonesian.

tags | paper, sql injection
SHA-256 | e3aa7441ce7deb5e534679f40dc15f786367faa10e651b0d1a65433fca02f778
Oracle Penetration Testing Using The Metasploit Framework
Posted Nov 2, 2010
Authored by Chris Gates, Mario Ceballos

Whitepaper called Oracle Penetration Testing Using the Metasploit Framework.

tags | paper
SHA-256 | 5f83e34bb9fafd4e3e942567202ceb11434ef372ffb87749583ed54f98922e90
Practical Padding Oracle Attacks
Posted Sep 29, 2010
Authored by Juliano Rizzo, Thai Duong

These are slides from the Practical Padding Oracle Attack presentation given at BlackHat Europe 2010.

tags | paper
SHA-256 | 44d6bd6f34982348a4af9f4bd0fe7a99db3855f3ff6cb55230636fab6a2bbf7b
MySQL Injection - Simple Load File And Into OutFile Tutorial
Posted Aug 13, 2010
Authored by MikiSoft

This is a short tutorial called MySQL Injection - Simple Load File and Into OutFile.

tags | paper, sql injection
SHA-256 | 6866aa8f28dcac6458750046b3125a824fcea99b3aedbddd27f63076b1098e76
MySQL SQL Injection Tutorial
Posted Jul 26, 2010
Authored by Prashant Uniyal

This whitepaper is a MySQL SQL injection tutorial.

tags | paper, sql injection
SHA-256 | 517d27c0d6f06d56b0bfa16f3e725b79f33fe4a3755de1772342c7350620aa7c
SQL Injection With File Privileges
Posted Jun 29, 2010
Authored by fred777

Whitepaper called SQL Injection with File Privileges. Written in German.

tags | paper, sql injection
SHA-256 | 8a840f1a4c02b27eff38fa668101a0c35692ec019f154067aa6c23502a435bd6
SQL Injection With INFORMATION_SCHEMA
Posted Jun 25, 2010
Authored by fred777

Whitepaper called SQL Injection with INFORMATION_SCHEMA. Written in German.

tags | paper, sql injection
SHA-256 | a163eee81c0b2b2ca61c599aa48a492b19d92ef0e7f6836c52b7048326274b35
Page 1 of 4
Back1234Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close