#SQLinjection

JAVAPROjavapro
2025-06-03

“It won't happen to me.” That's what , & thought. Jonathan Vila walks you through the top hidden flaws still lurking in production code & how to shut the doors before it's too late.

Get smart: javapro.io/2025/04/29/top-secu

Rad Web Hostingradwebhosting
2025-05-29

10 Steps to Protect Your Against SQL Injection
This article provides a guide discussing how to protect your VPS against SQL injection.
What is SQL Injection?
SQL Injection is a type of cyber attack where an attacker inserts or “injects” malicious SQL code into a query through input fields, URLs, or other data entry points. If the application doesn't properly validate or sanitize the input, the ...
Continued 👉 blog.radwebhosting.com/how-to-

maschmiinw
2025-05-27

Today I learned one can create an alias which executes a custom function via in a database. Combine this with a or other application allowing and "oops, compromised". Lucky for me it was only an exercise and not in a real application.

Someone else wrote about it: medium.com/r3d-buck3t/chaining

And here are the official docs: h2database.com/html/commands.h

I truly miss the days I did not know of such things...

2025-05-26

iX-Workshop: Sichere Programmierpraktiken für Java-Entwickler

Bereit für sicheren Code? Erlernen Sie fortgeschrittene Sicherheitspraktiken für Java und schützen Sie Ihre Anwendungen vor Cyberkriminalität.

heise.de/news/iX-Workshop-Sich

#Cybersecurity #IT #iXWorkshops #Java #Security #Softwareentwicklung #SQLInjection #news

2025-05-19

iX-Workshop: Sichere Programmierpraktiken für Java-Entwickler

Bereit für sicheren Code? Erlernen Sie fortgeschrittene Sicherheitspraktiken für Java und schützen Sie Ihre Anwendungen vor Cyberkriminalität.

heise.de/news/iX-Workshop-Sich

#Cybersecurity #IT #iXWorkshops #Java #Security #Softwareentwicklung #SQLInjection #news

Security Landsecurityland
2025-05-08

🚨 A severe SQL injection vulnerability (CVE-2025-46337) has been discovered in the ADOdb PostgreSQL driver. Developers using PHP + PostgreSQL must update to version 5.22.9 immediately to stay secure.

Read More: security.land/critical-sql-inj

JCONjcon
2025-05-07

A single misstep in your infrastructure code can open the door to attacks. At , Jonathan Vila reveals the most common IaC security mistakes — and how to avoid them. Join his session!

Want to prep early? Check his article: javapro.io/2025/04/29/top-secu

Rad Web Hostingradwebhosting
2025-05-07

10 Steps to Protect Your Against SQL Injection
This article provides a guide discussing how to protect your VPS against SQL injection.
What is SQL Injection?
SQL Injection is a type of cyber attack where an attacker inserts or “injects” malicious SQL code into a query through input fields, URLs, or other data entry points. If the application doesn't properly validate or sanitize the input, the ...
Continued 👉 blog.radwebhosting.com/how-to-

JAVAPROjavapro
2025-05-02

A single SQL line. One careless deserialization. That's all it takes to bring your app down. @vilojona shows how even top teams get it wrong and how you can get it right. Ready to patch your blind spots?

Start here: javapro.io/2025/04/29/top-secu

JAVAPROjavapro
2025-04-29

Think your code is safe? So did . 🚨 @vilojona uncovers the top attacks hiding in your code right now - and how a single mistake can cost you everything.
Can you spot the flaw before hackers do?

Find out: javapro.io/2025/04/29/top-secu

2025-04-28

iX-Workshop: Sichere Programmierpraktiken für Java-Entwickler

Bereit für sicheren Code? Erlernen Sie fortgeschrittene Sicherheitspraktiken für Java und schützen Sie Ihre Anwendungen vor Cyberkriminalität.

heise.de/news/iX-Workshop-Sich

#Cybersecurity #IT #iXWorkshops #Java #Security #Softwareentwicklung #SQLInjection #news

Hans-Cees 🌳🌳🤢🦋🐈🐈🍋🍋🐝🐜hanscees@ieji.de
2025-04-27
Rad Web Hostingradwebhosting
2025-04-22

10 Steps to Protect Your Against SQL Injection
This article provides a guide discussing how to protect your VPS against SQL injection.
What is SQL Injection?
SQL Injection is a type of cyber attack where an attacker inserts or “injects” malicious SQL code into a query through input fields, URLs, or other data entry points. If the application doesn't properly validate or sanitize the input, the ...
Continued 👉 blog.radwebhosting.com/how-to-

2025-04-19

SQL Injection (SQLi) 💉 – Everything You Need to Know

What is SQL Injection?
SQL Injection is a code injection technique that allows attackers to interfere with the queries an application makes to its database.

Types of SQLi:

1. In-band SQLi – Most common and easy to exploit.

2. Blind SQLi – Data isn’t visibly returned but can still be extracted through inference.

3. Out-of-band SQLi – Uses external servers to get results (less common but powerful).

4. Time-Based Blind SQLi – Server delay used to infer info from the database.

Attack Scenarios:
▫️Bypassing logins
▫️Dumping database contents
▫️Modifying or deleting data
▫️Escalating privileges
▫️Accessing admin panels

Common SQLi Targets:
🔹Login forms
🔹Search boxes
🔹URL parameters
🔹Cookies
🔹Contact or feedback forms

How to Prevent SQLi:
▪️Use parameterized queries
▪️Employ ORM frameworks
▪️Sanitize all user inputs
▪️Set least privilege for DB users
▪️Use Web Application Firewalls (WAF)

♦️Red Team Tip
Test all user input points, especially where data touches the database. Think beyond login forms—SQLi hides in unexpected places.

🔖Hashtags:
#SQLInjection #CyberSecurity #EthicalHacking #InfoSec #WebSecurity #RedTeam #BugBounty #Pentesting

⚠️Disclaimer:
This content is for educational purposes only. Always perform security testing with explicit permission. Unauthorized testing is illegal and unethical.

2025-04-19

Everything About SQL Injection 💉

What is SQL Injection?
SQL Injection is a web vulnerability that lets attackers manipulate database queries. This can lead to unauthorized access, data leaks, or even full control of the system.

🔬Types of SQL Injection

1️⃣ Classic SQLi – Injecting raw SQL commands.
2️⃣ Blind SQLi – No errors, but the response changes.
3️⃣ Time-Based SQLi – Uses response delays to extract data.
4️⃣ Union-Based SQLi – Merges malicious queries with valid ones.
5️⃣ Out-of-Band SQLi – Exfiltrates data through DNS, HTTP, etc.

♦️Potential Impact
▫️Access & dump sensitive data
▫️Bypass login systems
▫️Alter or delete database entries
▫️Full system compromise

🔰Common Entry Points
▫️Login forms
▫️Search inputs
▫️Contact forms
▫️URL query parameters

Defense Strategies 🛡
✅ Use parameterized queries
✅ Validate & sanitize inputs
✅ Apply least privilege to DB accounts
✅ Monitor logs for anomalies
✅ Perform regular security audits

📀Image Description (for visual):
🔹A sleek cyber-themed layout with:
🔹A hacker icon injecting code
🔹A login form being exploited
🔹Database icons showing exposed data
🔹A shield labeled “Prepared Statements” blocking the attack

🔖Tags
#SQLInjection #CyberSecurity #EthicalHacking #WebSecurity #BugBounty #InfoSec #Pentesting #OWASP #DatabaseSecurity #HackerTips

⚠️Disclaimer
This content is for educational and ethical purposes only. Do not attempt to exploit vulnerabilities without proper authorization. Always follow legal and ethical guidelines when testing or learning about cybersecurity.

2025-04-19

SQL Server Data Insertion: Best Practices and Error Handling in C#
Master SQL Server Data Insertion with best practices! Learn parameterized queries to prevent SQL injection & use robust error handling for efficient, secure database interactions.
tech-champion.com/database/sql
...

2025-04-19

SQL Server String Aggregation: SQL Server 2016 vs. 2017
Master SQL Server String Aggregation across versions (2016+). Learn dynamic SQL, best practices, & secure techniques to prevent SQL injection.
tech-champion.com/general/sql-
...

2025-04-19

Dynamic SQL in DB2: Using Variables for Table Names
Learn about DB2 Dynamic SQL: build flexible queries with variables, but prioritize security! Use prepared statements to prevent SQL injection. Master secure coding practices for robust database apps.
tech-champion.com/database/db2
...

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst