Search the Community
Showing results for tags 'sql injection'.
Okay, so first, I'm a student. I'm completing a project that requires analyzing a pcap file in Wireshark. One part of it is finding the series of packets that indicate a buffer overflow, followed by an SQL injection. I have no idea whatsoever how to filter for this, or even what to look for if I do see it. It's the only part that I haven't been able to solve yet. Everything else, Google was pretty helpful. Hints? Ideas? Filter recommendations? Thank you!
I am delighted to announce that the course 'The Art of Exploiting Injection Flaws' has been selected to run at *ALL* leading IT security events around the world. These are: Black Hat Las Vegas July 29th-30th BruCon (Belgium) September 24th-25th HITB (Malaysia) October 14th and 15th Ruxcon (Melbourne, Australia) October 22nd-23rd Appsec (NYC, USA) Nov 18th-19th The 2 day hands-on course talks about SQLI, LDAP, XPATH, HQLI, XXE and other Injection flaws. A selection of slides from the course can be found here: http://www.slideshare.net/notsosecure/injection-flaw-teaser