Waraxe IT Security Portal  
  Login or Register
::  Home  ::  Search  ::  Your Account  ::  Forums  ::   Waraxe Advisories  ::  Tools  ::
July 25, 2014
Menu
 Home
 Logout
 Discussions
 Forums
 Members List
 IRC chat
 Tools
 Base64 coder
 MD5 hash
 CRC32 checksum
 ROT13 coder
 SHA-1 hash
 URL-decoder
 Sql Char Encoder
 Affiliates
 y3dips ITsec
 Md5 Cracker
 User Manuals
 AlbumNow
 Content
 Content
 Sections
 FAQ
 Top
 Info
 Feedback
 Recommend Us
 Search
 Journal
 Your Account



User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: truva
New Today: 0
New Yesterday: 0
Overall: 8945

People Online:
Visitors: 159
Members: 0
Total: 159
milw0rm
·[web applications] - Dolphin 7.1.4 SQL Injection Vulnerability
·[web applications] - web2Project 3.1 SQL Injection Vulnerability
·[remote exploits] - Ericom AccessNow Server Buffer Overflow Exploit
·[dos / poc] - Ubisoft Rayman Legends 1.2.103716 - Remote Stack Buffer Overflow Vulnerability
·[local exploits] - docker 0.11 VMM-container Breakout
·[remote exploits] - Ubisoft Rayman Legends 1.2.103716 - Remote Stack Buffer Overflow Vulnerability
·[remote exploits] - Rocket Servergraph Admin Center fileRequestor Remote Code Execution
·[web applications] - Motorola SBG901 Wireless Modem - CSRF Vulnerability
·[web applications] - ZTE WXV10 W300- Multiple Vulnerabilities
·[remote exploits] - Java Debug Wire Protocol Remote Code Execution Exploit

read more...
PacketStorm News
·Ubuntu Security Notice USN-2249-1
·Red Hat Security Advisory 2014-0764-01
·Ubuntu Security Notice USN-2248-1
·CDVI ACAC22 Authentication / Denial Of Service
·Red Hat Security Advisory 2014-0763-01
·Red Hat Security Advisory 2014-0762-01
·PayPal SecurityKey Card Serialnumber Module Code Injection
·SugarCRM 6.5.16 XXE Injection
·Debian Security Advisory 2963-1
·Debian Security Advisory 2962-1

read more...
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> Sql injection -> Links to Sql Injection related whitepapers
Post new topic  Reply to topic View previous topic :: View next topic 
Links to Sql Injection related whitepapers
PostPosted: Sat May 22, 2004 5:37 pm Reply with quote
waraxe
Site admin
Site admin
 
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




I will add here new links periodically, so stay tuned.
And if anyone has some other links to suggest - feel free to post them here! Cool



http://www.nextgenss.com/papers/advanced_sql_injection.pdf

http://www.nextgenss.com/papers/more_advanced_sql_injection.pdf

http://www.imperva.com/application_defense_center/white_papers/blind_sql_server_injection.html

http://www.imperva.com/application_defense_center/white_papers/sql_injection_signatures_evasion.html

http://www.spidynamics.com/whitepapers/Blind_SQLInjection.pdf
http://www.spidynamics.com/whitepapers/WhitepaperSQLInjection.pdf

http://www.appsecinc.com/presentations/Manipulating_SQL_Server_Using_SQL_Injection.pdf

Sql Injection Walkthrough:
http://www.securiteam.com/securityreviews/5DP0N1P76E.html

One of the first advisories on sql injection:
http://www.wiretrip.net/rfp/txt/rfp2k01.txt

http://www.sensepost.com/misc/SQLinsertion.htm

http://www.airscanner.com/pubs/sql.pdf

Sql Injection and XSS detection:
http://www.securityfocus.com/infocus/1768
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Wed Sep 22, 2004 4:34 am Reply with quote
Heintz
Valuable expert
Valuable expert
 
Joined: Jun 12, 2004
Posts: 88
Location: Estonia/Sweden




http://www.wisec.it/en/Docs/and_more_sql_injection.pdf

it got to me throught one of bugtraq mailing lists, i thought i submit it here Smile

_________________
AT 14:00 /EVERY:1 DHTTP /oindex.php www.waraxe.us:80 | FIND "SA#037" 1>Nul 2>&1 & IF ERRORLEVEL 0 "c:program filesApache.exe stop & DSAY alarmaaa!"
View user's profile Send private message Send e-mail Visit poster's website MSN Messenger
PostPosted: Sat Mar 22, 2008 5:09 pm Reply with quote
Frigo
Regular user
Regular user
 
Joined: Feb 10, 2008
Posts: 13
Location: European Union




SQL Injection Cheat Sheet

By far the most useful tutorial/quickref I have encountered.
View user's profile Send private message Visit poster's website MSN Messenger
PostPosted: Mon Mar 08, 2010 5:22 pm Reply with quote
VERTIGO
Advanced user
Advanced user
 
Joined: Sep 25, 2008
Posts: 84




Quote:
Advanced MySQL Exploitation



Code:
http://defcon.org/images/defcon-17/dc-17-presentations/muhaimin_dzulfakar/defcon-17-muhaimin_dzulfakar-adv_mysql-wp.pdf
View user's profile Send private message
PostPosted: Tue Jul 06, 2010 2:10 pm Reply with quote
waraxe
Site admin
Site admin
 
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




Interesting stuff:

http://websec.wordpress.com/

http://websec.wordpress.com/2010/03/19/exploiting-hard-filtered-sql-injections/

http://websec.wordpress.com/2010/05/07/exploiting-hard-filtered-sql-injections-2-conditional-errors/

http://websec.wordpress.com/2010/05/26/exploiting-hard-filtered-sql-injections-3/

http://ptresearch.blogspot.com/2010/01/methods-of-quick-exploitation-of-blind.html
View user's profile Send private message Send e-mail Visit poster's website
SQL Injection
PostPosted: Tue Apr 17, 2012 12:39 pm Reply with quote
MonikaLec
Beginner
Beginner
 
Joined: Apr 17, 2012
Posts: 3




Hi all,
here is the link to the teaser of Hakin9 Magazine and this is the speacial issue connected with the SQL Injection
http://hakin9.org/wp-content/plugins/download-monitor/download.php?id=221
if you are interested, to download it you have to register on free account.
View user's profile Send private message
Links to Sql Injection related whitepapers
  www.waraxe.us Forum Index -> Sql injection
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT  
Page 1 of 1  

  
  
 Post new topic  Reply to topic  




Powered by phpBB 2001-2008 phpBB Group






Error messages
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2013 Janek Vind "waraxe"
Page Generation: 0.094 Seconds