Investigating uPNP with Python for fun and profit
Investigating uPNP with python for fun and profit. SSDP is an interesting uPNP protocol - devices advertise their capabilities on the network and leak valuable information. SSDP is very similar…
Investigating uPNP with python for fun and profit. SSDP is an interesting uPNP protocol - devices advertise their capabilities on the network and leak valuable information. SSDP is very similar…
I've been training over the last 4 weeks for my Scrum Alliance Certified Scrum Master Certification. I took an online course, which was delivered over zoom in real time (as…
300 word summary for Defending Against Injection Attacks What is the paper about? Defending Against Injection Attacks Through Context-Sensitive String Evaluation introduces CSSE - Context-Sensitive String Evaluation - a way to…
What is an API (Introduction to APIs) Carrying on from my previous posts on SOA here and here I thought it may be useful to write a post on what…
300 word summary: AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks. Provides a valuable background section on the countermeasures for SQL injection attacks: Defensive ProgrammingGeneral Techniques against SQLiStatic Analysis techniques…
My MSc Thesis in 2016 was titled Evaluation of SQL injection testing tools and techniques. I had a quick look through all my old uni work looking for content to…
My research notes about the different types of sqli - sql injection attack types; inband (eg reading errors from the screen) out-of-band (getting information from a different channel eg from…
What is the paper about? a holistic approach for a static analysis algorithm to detect sqli in web applications using run-time inspection Who is the intended audience? researchers Is title/abstract…
This paper (A Classification of SQL Injection Attacks and Countermeasures) has an excellent section on Injection mechanisms - the way that sql code is modified to actually perform the injection…