Test
Test and discover vulnerabilities networks before attackers
Senin, 3 Desember 2012
It's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers being stolen from unprotected databases. Cyber crime and the threat of computer-related attacks are growing daily, and the need for security professionals who understand how attackers compromise networks is growing right along with the threat.Government agencies and private companies rely on "ethical h...
How to Test for SQL Injection Bugs
Rabu, 22 Juni 2011
Below is a summary of steps needed for testing for SQL injection bugs
Step 1: Understand SQL injection attack scenarios
Step 2: List high risk components and entry points
Step 3: Start testing and exploring
Step 4: Tune of test data
Step 4: Tune test cases data
At
this point you have started executing an exploratory pass through the
input variables. During step 4 you need to concentrate on covering all
entry points of each variab...