<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Sumit+Siddharth</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Sumit+Siddharth"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Sumit_Siddharth"/>
		<updated>2026-04-26T04:53:01Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=The_Art_of_Exploiting_SQL_Injections&amp;diff=89943</id>
		<title>The Art of Exploiting SQL Injections</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=The_Art_of_Exploiting_SQL_Injections&amp;diff=89943"/>
				<updated>2010-09-23T20:52:37Z</updated>
		
		<summary type="html">&lt;p&gt;Sumit Siddharth: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:468x60-banner-2010.gif|link=http://www.owasp.org/index.php?title=OWASP_AppSec_DC_2010]] &lt;br /&gt;
&lt;br /&gt;
[https://guest.cvent.com/EVENTS/Register/IdentityConfirmation.aspx?e=d52c6f5f-d568-4e16-b8e0-b5e2bf87ab3a Registration] | [https://resweb.passkey.com/Resweb.do?mode=welcome_gi_new&amp;amp;groupID=2766908 Hotel] | [http://www.dcconvention.com/ Walter E. Washington Convention Center]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
==Description==&lt;br /&gt;
'''Course Length: 1 Day'''&lt;br /&gt;
&lt;br /&gt;
This is a full day hands on training course which will typically target penetration testers, security auditors/administrators  and even web developers  to learn advanced exploitation techniques. SQL Injection, although now nearly 15 years old, still exists in over 30% of the web applications. This vulnerability could typically result in 3 scenarios:&lt;br /&gt;
&lt;br /&gt;
# Authentication Bypass&lt;br /&gt;
# Extraction of arbitrary sensitive data from the database&lt;br /&gt;
# Access and compromise of the internal network.&lt;br /&gt;
&lt;br /&gt;
To identify the true impact of this vulnerability it is essential that the vulnerability gets exploited to the full extent. While there is a reasonably good awareness when it comes to identify this problem, there are still a lot of grey areas when it comes to exploitation or even identifying complex vulnerabilities like a 2nd order injections. This training will target 3 databases (MS-SQL, Mysql, Oracle) and discuss a variety of exploitation techniques to exploit each scenario. The aim of the training course is to address the following:&lt;br /&gt;
&lt;br /&gt;
# Identify the most complicated sql injections which are beyond the scope of any automated tool?&lt;br /&gt;
# Identify and Extract sensitive data from back-end database?&lt;br /&gt;
# Privilege Escalation  within the database and extracting data with database admin privilege?&lt;br /&gt;
# OS code execution on these database server and use this as a pivot to attack internal network?&lt;br /&gt;
&lt;br /&gt;
==Student Requirements==&lt;br /&gt;
Students will need to bring a laptop with VMWare&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
Skill: Basic, Intermediate&lt;br /&gt;
&lt;br /&gt;
# Understand the problem of SQL Injection &lt;br /&gt;
# Learn a variety of advanced exploitation techniques which hackers use.&lt;br /&gt;
# How to fix the problem?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Instructor==&lt;br /&gt;
'''Instructor: Sumit Siddharth'''  Sumit &amp;quot;sid&amp;quot; Siddharth works as a Principal Security Consultant (Penetration Tester) for 7Safe Limited in the UK. He specializes in the application and database security and has more than 5 years of pentesting. Sid has authored a number of whitepapers and tools. He has been a speaker at many security conferences including Blackhat, Defcon, Troopers, OWASP Appsec, Sec-T etc. He also runs the popular IT security blog: [http://www.notsosecure.com www.notsosecure.com]&lt;br /&gt;
&lt;br /&gt;
[[Category:AppSec_DC_2010_Training]] [[Category:Basic_Training]]] [[Category:Intermediate_Training]]]&lt;/div&gt;</summary>
		<author><name>Sumit Siddharth</name></author>	</entry>

	</feed>