Hi,
I recently presented at three Conferences, for the ones of you
interested, the presentations slides are available online on my
SlideShare page[1].
Some of arguments discussed are SQL injection in ORDER BY and LIMIT
clauses, single entry UNION query SQL injection, bypass of column
numbers, SQL syntax detection, extensive back-end DBMS fingerprint,
sqlmap key features and specific web application technologies IDS
bypasses.
I look forward for feedback from you!
[1] http://www.slideshare.net/inquis
Cheers,
--
Bernardo Damele A. G.
E-mail / Jabber: bernardo.damele (at) gmail.com
Mobiles: +447788962949 (UK), +393493821385 (IT)
PGP Key ID: 0x05F5A30F
|