home.social

#sqli — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #sqli, aggregated by home.social.

  1. I wrote a quick #blogpost on #ntlm authentication with #sqlmap using #burpsuite proxy.

    bbence.me/blog/2025-03-09_ntlm

    I did this as a workaround, since the `python-ntlm` package that SQLMap wants still uses Python 2's syntax for some reason and SQLMap does not like that.

    #pentesting #sqli #blog #security

  2. And now the last talk before the afternoon break is Paul Gerste of Sonar who will show us that SQL-i #sqli isn’t dead in “SQL injection isn’t dead: Smuggling Queries at the Protocol level” at, of course, @hack_lu #hacklu2024

  3. Happening 15:30: "SQL Injection Isn't Dead: Smuggling Queries at the Protocol Level"

    @hack_lu #hacklu2024 #SQLi

  4. I also found some fun things in the general Ivanti area 🥳

    They're not as cool as other people's, but hey... I'll take it. CVE-2023-46807 and CVE-2023-46806 were published just a moment ago.

    cve.mitre.org/cgi-bin/cvename.

    cve.mitre.org/cgi-bin/cvename.

    #CVE #Ivanti #SQLi #sql_injection

  5. Found a great #opensource tool to scan sites for a laundry list of vulnerabilities github.com/h4r5h1t/webcopilot.

    Just used it to scan all my company domains, works great!

    The tools integrated into this single app are the same tools "security researchers" use to scan sites for #xss #SQLi #ssrf #crlf #lfi #subdomaintakeover #openredirect, etc. vulnerabilities - into a single CLI tool.

    Can also help avoid/confirm those "beg-bounty" situations where a simple misconfiguration is touted as a "critical vulnerability" because someone use a quick scanning tool to determine that sub-domain take-over is possible (very common, not critical, easy to fix), or missing DMARC records are present (which 98% of all Internet sites have issues with, and is very easy to fix) to demand a cash reward so they can "share additional critical vulnerabilities" that aren't a thing - they just want money.

    Have fun!

  6. 👉 #SOC2, #ISO270001, #PCI, and other regional laws require you to have a clean, zero-vulnerability report.

    That said, even critical vulnerabilities take 250+ days to patch, especially when these exist in third-party plug-ins, open-source libraries, or legacy code.

    Compounding the problem are #zerodayvulnerabilities like the MOVEit SQLi, Zimbra XSS, and 300+ such vulnerabilities that get discovered each month.

    Delays in fixing these #vulnerabilities lead to compliance issues and worse exploits, leading to loss of data/reputation and business.

    To help app sec teams, we are launching a unique feature on #AppTrana that’ll help you get a “Zero vulnerability report” within 72 hours.

    In the upcoming webinar, join Vivekanand Gopalan, VP of Product at Indusface, as he discusses the inner workings of this release, including:

    - Onboarding: The onboarding process on AppTrana

    - Application Audit: The audit process that uncovers vulnerabilities

    - Tuning: Development of application specific patches to virtually patch all vulnerabilities

    - Revalidation: The final revalidation report that gives you a clean, zero vulnerability report for all your compliance requirements

    To register for this event: bit.ly/3vrl3Ef

    #0day #moveit #sqli, #xss #applicationsecurity #applicationaudit #virtualpatching #compliance #appsec