Articles about: Pentesting

Exploiting information leaks in SQL injection

In some cases a SQL injection doesn't result in a trivial exploit. Instead of a direct hack, there could be an information leak vulnerability. Here's an example of a vulnerable application and an efficient attack on the information leak. Read more »