exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 76 RSS Feed

Files

SQL Injection Filtering
Posted May 25, 2010
Authored by d3c0der

Whitepaper called SQL Injection Filtering. Written in Persian.

tags | paper, sql injection
SHA-256 | 471f2f35cac4b774613c5c87f33f9439226204686687b4aa52a6690d0be6aa40
Whitepaper Called Easy Method: Blind SQL Injection
Posted May 18, 2010
Authored by Mohd Izhar Ali | Site johncrackernet.blogspot.com

This is a whitepaper called Easy Method: Blind SQL Injection.

tags | paper, sql injection
SHA-256 | 547d834ca1072c413ae68db738748f28241b571a72a3cc57cbf692e49218790b
SQL Injection - Working With MySQL
Posted May 5, 2010
Authored by fred777

Whitepaper called SQL Injection - Working With MySQL. Written in German.

tags | paper, sql injection
SHA-256 | a6b1548d65f07d81d842b7e94aaf26483dcaecae4a856edc4829b214b4f9bfa3
Technique Of Quick Exploitation Of Double Blind SQL Injection
Posted May 5, 2010
Authored by Dmitriy Evteev

Whitepaper called Technique Of Quick Exploitation Of Double Blind SQL Injection.

tags | paper, sql injection
SHA-256 | 6fd6d8f9f3df57755617038b830d13a062458ae3a6053f3f323e9e60bed9e712
Oracle, Interrupted: Stealing Sessions And Credentials
Posted Apr 2, 2010
Authored by Steve Ocepek, Wendel G. Henrique

Whitepaper called Oracle, Interrupted: Stealing Sessions and Credentials.

tags | paper
SHA-256 | 67faf2a1fd7fce738ed05b8ec8a8a306eec159d3ee838f85076833bb0c00846f
MySQL Injection Using darkMySQLi.py
Posted Mar 15, 2010
Authored by Mohd Izhar Ali | Site johncrackernet.blogspot.com

Whitepaper called MySQL Injection using darkMySQLi.py.

tags | paper, sql injection
SHA-256 | 2243af002ca4a3a86ddb02b86c7364c691661d6787ccaca2da39a22d80772fc6
Hacking Oracle From The Web
Posted Feb 23, 2010
Authored by Sumit Siddharth

Whitepaper called Hacking Oracle from the Web: Exploiting SQL Injection from Web Applications.

tags | paper, web, sql injection
SHA-256 | 79d7a613b30646f28183095a34cb7269351d1fcc8c121d569257117938cc0ca4
SQL Injection In MS-SQL 2005
Posted Feb 12, 2010
Authored by MCchain | Site hacktimes.com

Whitepaper called SQL Injection in MS-SQL Server 2005. Written in Spanish.

tags | paper, sql injection
SHA-256 | 29d0494e69747f26b4e1af5444a08ccc9bada3b32f90947e974a322af25cd91c
Exploiting PL/SQL Injection With Only Create Session Privileges In Oracle 11g
Posted Feb 12, 2010
Authored by David Litchfield

Whitepaper called Exploiting PL/SQL Injection With Only CREATE SESSION Privileges In Oracle 11g.

tags | paper, sql injection
SHA-256 | 31157f3cb6f553cf34b6e768826f981a7cca2b5b1cc22b2d008070e67dfeea5a
Hacking Aurora In Oracle 11g
Posted Feb 12, 2010
Authored by David Litchfield

Whitepaper called Hacking Aurora In Oracle 11g.

tags | paper
SHA-256 | 0feb80641a5561dcb72d5ac33a246623657479f00c1457155b7e072996ee1aa7
Methods Of Quick Exploitation Of Blind SQL Injection
Posted Jan 27, 2010
Authored by Dmitriy Evteev | Site securitylab.ru

Whitepaper called Methods Of Quick Exploitation Of Blind SQL Injection.

tags | paper, sql injection
SHA-256 | c69a4c103d432b2d88223df4dc98088b20c316605edf6809bd15d959593d2fd5
SQL Injection Write Up In Indonesian
Posted Sep 22, 2009
Authored by Gonzhack

Brief whitepaper discussing SQL injection in MySQL. Written in Indonesian.

tags | paper, sql injection
SHA-256 | 19938f7e92bbeb6464cfd177e05a082c218aaa070c80f9de4fbf08073411fca5
MS-SQL Injection Tutorial
Posted Sep 22, 2009
Authored by Inj3ct0r | Site Inj3ct0r.com

MS-SQL injection tutorial written in Albanian.

tags | paper, sql injection
SHA-256 | 8ef07e5e29143b5b33639b6747fb8fc4954afc7a82ec26965349ba787f70a703
Simple SQL Injection Whitepaper
Posted Sep 11, 2009
Authored by jiko

Whitepaper called Simple SQL Injection. Written in Arabic.

tags | paper, sql injection
SHA-256 | 0a6069a2d97eb2998fc1070fe0a769864563542217c8929a1722d24a6a805e9c
Protection Against SQL Injection
Posted Sep 4, 2009
Authored by Moudi

Whitepaper called Protection Against SQL Injection. Written in French.

tags | paper, sql injection
SHA-256 | 29ffef0ca793fcfa8b985dc41aa044661000511aa27a3fef9382fa2508d840cc
Whitepaper About Blind SQL Injection
Posted Aug 6, 2009
Authored by MizoZ

This is a brief write up discussing blind SQL injection attacks. Written in French.

tags | paper, sql injection
SHA-256 | 850e44ffacd06e23d7caec378232e76af6b7f4ef2eb9209c89c61b21dba24190
Whitepaper - Optimización de SQL Union Injection en MYSQL
Posted Aug 6, 2009
Authored by OzX | Site foro.undersecurity.net

Whitepaper called Optimizacion de SQL Union Injection en MYSQL. Written in Spanish.

tags | paper
SHA-256 | 89d8781420c427ea8b45be477b8596c114134e005d430eea4c74bd2273a6baef
MySQL: Secure Web Apps - SQL Injection Techniques
Posted Mar 9, 2009
Authored by Omnipresent

Whitepaper called MySQL: Secure Web Apps - SQL Injection Techniques.

tags | paper, web, sql injection
SHA-256 | 0930f3a77eb458da8c9b9a814769e7cd4e1235ac3871a8c0be819bd5167283ff
SFX-SQLi - Select For XML SQL Injection
Posted Feb 6, 2009
Authored by Daniel Kachakil

Whitepaper called SFX-SQLi - Fast data extraction using SQL injection and XML statements.

tags | paper, sql injection
SHA-256 | ae97266f3b883dab25125e4ab583e17a7545ba6a9d60283d9bf7b3fac53d0de3
Whitepaper - Full MSSQL Injection PWNage
Posted Jan 31, 2009
Authored by CWH Underground | Site citecclub.org

Whitepaper called Full MSSQL Injection PWNage.

tags | paper, sql injection
SHA-256 | bdb81bebb5435f02e77ce19c3a48f47d946646f78ad695090d844eb338e2aa51
Oracle E-Business Suite Information Disclosure
Posted Jan 21, 2009
Authored by Aditya K Sood | Site secniche.org

Oracle E-Business Suite Release 12, version 12.0.6 and Oracle E-Business Suite Release 11i, version 11.5.10.2 both suffer from a sensitive information disclosure vulnerability.

tags | paper, info disclosure
advisories | CVE-2008-5446
SHA-256 | b032dcce1d5cb72ed6d46a15fa7223262285bc592fdb8cca36d2fc2ea54585e3
oracle-forensics-scns.pdf
Posted Nov 26, 2008
Authored by David Litchfield | Site databasesecurity.com

Oracle Forensics Part 7: Using the Oracle System Change Number in Forensic Examinations.

tags | paper
SHA-256 | 051ce7024ae89d5e1b9b1e94a3bf3171e5efbdd0947cbd1832b4846b9d8611cf
create_any_directory_to_sysdba.pdf
Posted Oct 13, 2008
Authored by Paul Wright | Site oracleforensics.com

An Oracle DB user which has been granted CREATE ANY DIRECTORY can use that system privilege to grant themselves the SYSDBA system privilege by creating a DIRECTORY pointing to the password file location on the OS and then overwriting it with a previously prepared known binary password file using UTL_FILE.PUT_RAW from within the DB. This paper will show how the issue can be exploited and most importantly how to secure against it.

tags | paper
SHA-256 | d831e6ebd8c7df2437915b869b9d31a97fd007d4363bebebfe908afab3c60f97
oracle-assault.pdf
Posted Oct 7, 2008
Authored by Aelphaeis Mangarae | Site blackhat-forums.com

This paper discusses injection into Oracle PL/SQL databases objects.

tags | paper
SHA-256 | 306aad7837ab141baadbadd186fb4f8aefb3ef5afdd488289c03f1e484a0a996
mysql-truncate.txt
Posted Sep 12, 2008
Site 80sec.com

Short write up discussing MySQL character set truncation vulnerabilities.

tags | paper, vulnerability
SHA-256 | 1553a1e8d1d0ff34395194b38aa66753f806fd86e6b26acf190557782c16897b
Page 2 of 3
Back123Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close