dev-resources.site
for different kinds of informations.
SQL Injection Principles, Vulnerability Discovery and Mitigation Strategies
Published at
12/18/2024
Categories
security
cybersecurity
writing
Author
TECNO Security
This article primarily shares an experience in exploiting SQL injection vulnerabilities in mobile app applications, focusing on the current environment and the various ways SQL injection can still be exploited along with its principles. It then goes on to share my approach to SQL injection exploitation and some methods to bypass Web Application Firewalls (WAF) for SQL injection through a practical exploitation process.
● SQL Injection Principle
● Vulnerability Discovery Process
● Mitigation Strategies for SQL Injection
Click here to know details: Mobile Application Bounty Practice: SQL Injection Principles, Vulnerability Discovery and Mitigation Strategies
Articles
12 articles in total
Automated Penetration Testing: A Guide to Domain Collection
read article
【Activities Guide】A detailed overview of the TECNO Security Response Center's security incentive activities
read article
Guidelines about the Refer-a-Friend Program
read article
SQL Injection Principles, Vulnerability Discovery and Mitigation Strategies
currently reading
TECNO SRC Security Vulnerability Submission Function Survey
read article
Unveiling the Unseen: A Journey from Simple Recon Using Shodan to Leaking AWS Secrets
read article
Web vulnerability bounty rules update
read article
【Vulnerability Campaign】Earn Your Thanksgiving Bonus Rebate
read article
Critical File Upload Vulnerabilities: Exploits and Mitigation Strategies
read article
[2024 Thanksgiving] Security Technology Research Writing Activity
read article
Guide to Writing Security Technology Blog Articles
read article
Hacking your first OAuth on the Web application
read article
Featured ones: