Blind SQL Injection

We are going to take a look at how to find the most common types of blind SQL vulnerabilities, how to exploit them in order to exfiltrate data and also how to mitigate the risk in your own applications.

SQL Injection Isn't Going Anywhere

SQL Injection Isn’t Going Anywhere

SQL injections might sound like a thing from the past, but in actuality, it is still one of the most widely used methods of attack by hackers around the world.