Title |
Speakers |
Conference |
Tags |
What Permissions Does Your Database User REALLY Need? |
Dan Cornell
|
OWASP AppSec Research-2012 - Athens, Greece |
SQL
Defence
Databases
|
White And Black Box Testing Of Lotus Domino Applications |
Ari Elias-bachrach
,
Casey Pike
|
OWASP Appsec-2010 - Washington DC, USA |
Security
Application Security
SQL
|
Hacking Oracle From Web Apps |
Anonymous Speaker
|
OWASP Appsec-2010 - Washington DC, USA |
Security
Web
SQL
|
Automated Sql Ownage Techniques |
Sebastian Cufre
|
NinjaCon-2010 - Vienna, Austria |
Automation
SQL
|
Nosql == No Sql Injections? |
Wayne Huang
|
DEF CON-18 - Las Vegas, USA |
Security
SQL
|
“How To Present A New Release Of A Sql Injection Tool Without Talking About Sql Injection At All” |
Alberto Revelli
|
AthCon-2010 - Athens, Greece |
Security
SQL
|
Javascript From Hell - Advanced Client-Side Injection Techniques Of Tomorrow |
Mario Heiderich
|
OWASP Appsec-2009 - Germany |
Security
Deep Knowledge
Network Penetration
SQL
|
Sql Injection - How Far Does The Rabbit Hole Go? |
Justin Clarke
|
BruCON-2009 - Brussels, Belgium |
SQL
|
The Making Of The Second Sql Injection Worm |
Sumit "sid" Siddharth
|
DEF CON-17 - Las Vegas, USA |
Security
SQL
|
Advanced Sql Injection |
Joseph Mccray
|
DEF CON-17 - Las Vegas, USA |
Security
SQL
|
Advanced Sql Injection Exploitation To Operating System Full Control |
Bernardo Guimaraes
|
Blackhat Europe-2009 - Barcelona, Spain |
Security
Exploitation
SQL
|
Re-Playing With (Blind) Sql Injection |
Chema Palako
|
ShmooCon-2009 - Washington DC, USA |
Security
SQL
|
Time-Based Blind Sql Injection Using Heavy Queries: A Practical Approach For Ms Sql Server, Ms Access, Oracle And Mysql Databases And Marathon Tool |
Chema Alonso
,
Josăš Parada
|
DEF CON-16 - Las Vegas, USA |
Security
SQL
|
New Tool For Sql Injection With Dns Exfiltration |
Robert Ricks
|
DEF CON-16 - Las Vegas, USA |
Security
DNS
SQL
|
Sql Injection Worms For Fun And Profit |
Justin Clarke
|
Blackhat USA-2008 - Las Vegas, USA |
Security
SQL
|
Automatic Generation Of Xss And Sql Injection Attacks With Goal-Directed Model Checking |
Michael Lam
|
17th USENIX Security Symposium-2008 - San Jose, USA |
Security
SQL
|
Sql Injection And Out-Of-Band Channeling |
Patrik Karlsson
|
DEF CON-15 - Las Vegas, USA |
Security
SQL
|
Sql Server Database Forensics |
Kevvie Fowler
|
Blackhat USA-2007 - Las Vegas, USA |
Security
Forensics
SQL
|
Sql Injections By Truncation |
Bala Neerumalla
|
Blackhat USA-2005 - Las Vegas, USA |
Security
SQL
|
Advanced Sql Injection In Oracle Databases |
Esteban Martínez Fayó
|
Blackhat USA-2005 - Las Vegas, USA |
Security
SQL
|
Advance Sql Injection Detection By Join Force Of Database Auditing And Anomaly Intrusion Detection |
Yuan Fan
|
Blackhat USA-2005 - Las Vegas, USA |
Security
Auditing
SQL
|
Demystifying Ms Sql Server &Amp; Oracle Database Server Security |
Cesar Cerrudo
|
Blackhat USA-2005 - Las Vegas, USA |
Security
SQL
|
Sql Injection &Amp; Data Mining Through Inference |
David Litchfield
,
Founder
,
Next Software
|
Blackhat Europe-2005 - Amsterdam, The Netherlands |
Security
SQL
|
Automated Blind Sql Exploitation |
Cameron Hotchkies
|
ShmooCon-2005 - Washington DC, USA |
Security
SQL
|
Blind Sql Injection Automation Techniques |
Cameron “nummish” Hotchkies
|
DEF CON-12 - Las Vegas, USA |
Security
Automation
SQL
|
Bloggers At The Dnc |
Brad Johnson
|
The Fifth HOPE -2004 - USA |
Security
Panel
SQL
|
Sql Injection |
Kevin Spett
|
Blackhat USA-2003 - Las Vegas, USA |
Security
SQL
|
Sql Injection |
Kevin Spett
|
DEF CON-10 - Las Vegas, USA |
Security
SQL
|
One-Way Sql Hacking: Futility Of Firewalls In Web Hacking |
Jd Glaser
,
Saumil Udayan Shah
|
Blackhat Europe-2001 - Amsterdam, The Netherlands |
Security
Web
SQL
|
Sql Security Revisited. |
Chip Andrews
|
Blackhat USA-2001 - Las Vegas, USA |
Security
SQL
|