Skip to content
Corporate Blog

Corporate Blog

Opinions on Penetration Testing, Web-Application Security, Network Security, Mobile Security & Everything In Between

  • Twitter
  • Facebook
  • LinkedIn
  • Instagram
Search
  • Home
  • Security Attacks
    • Cross-Site Request Forgery
    • Cross-Site Scripting
    • KRACK
    • SQL Injection
  • Databases
    • MSSQL
    • MySQL
    • Oracle
  • Recommendations
    • Data Breaches
    • Input Validation
    • Insecure Cryptographic Storage
    • Phishing Attacks
    • Redirect Abuse
  • Wireless
    • MAC Address Filtering
    • SSID
    • WPA
    • WPA2

Fixing SQL Injection in .NET and Oracle

Posted on May 26, 2011July 12, 2019 by Yash

Note: This post is part of our series on “How to Fix SQL Injection Vulnerabilities“. The series contains examples on

Continue Reading
.NET, Databases, Input Validation, Languages, Oracle, Recommendations, Security Attacks, SQL Injection
Leave a comment

Fixing SQL injection in ASP and MS SQL

Posted on May 26, 2011July 12, 2019 by Yash

Note: This post is part of our series on “How to Fix SQL Injection Vulnerabilities“. The series contains examples on

Continue Reading
ASP, Databases, Input Validation, Languages, MSSQL, Recommendations, Security Attacks, SQL Injection
Leave a comment

Fixing SQL injection in ASP and Oracle

Posted on May 26, 2011July 12, 2019 by Yash

Note: This post is part of our series on “How to Fix SQL Injection Vulnerabilities“. The series contains examples on

Continue Reading
ASP, Databases, Input Validation, Languages, Oracle, Recommendations, Security Attacks, SQL Injection
Leave a comment

Wireless Security: How to Change Default Administrator Usernames and Passwords

Posted on May 26, 2011July 12, 2019 by Yash

Note: This post is part of our series on “How to Secure Your Home Wireless Network“. The series contains a

Continue Reading
Wireless
Leave a comment

Fixing SQL Injection in PHP and Oracle

Posted on May 26, 2011July 12, 2019 by Yash

Note: This post is part of our series on “How to Fix SQL Injection Vulnerabilities“. The series contains examples on

Continue Reading
Databases, Input Validation, Languages, Oracle, PHP, Recommendations, Security Attacks, SQL Injection
One comment

What is a SQL Injection Vulnerability?

Posted on May 24, 2011July 12, 2019 by Yash

An SQL Injection attack is a code injection attack when input from an attacker reaches one of your databases without

Continue Reading
Input Validation, Recommendations, Security Attacks, SQL Injection
Leave a comment

Posts navigation

«Previous Posts 1 … 3 4 5

Quick Links

  • Popular
  • Categories
  • Archives
  • Tags
  • Fixing Cross-site Scripting in Spring MVC
    May 1, 2012
  • 5 Steps to Avoid Phishing Scams in E-mail
    December 25, 2012
  • How to Secure Home Wireless Network
    May 26, 2011
  • Fixing Cross-site Scripting in Java
    May 1, 2012
  • Wireless Security: How to Disable SSID Broadcast
    May 27, 2011
  • .NET (5)
  • ASP (5)
  • Cross-Site Request Forgery (1)
  • Cross-Site Scripting (3)
  • Data Breaches (1)
  • Databases (9)
  • Frameworks (1)
  • IBM AS/400 (2)
  • Input Validation (14)
  • Insecure Cryptographic Storage (1)
  • Java (6)
  • JSP (2)
  • KRACK (1)
  • Languages (20)
  • MAC Address Filtering (1)
  • MSSQL (4)
  • MySQL (1)
  • Office Events (1)
  • Oracle (4)
  • Phishing Attacks (1)
  • PHP (6)
  • Recommendations (18)
  • Red Team (1)
  • Redirect Abuse (1)
  • Security Attacks (16)
  • Security Audit (2)
  • Spring MVC (1)
  • SQL Injection (11)
  • SSID (2)
  • Weekly Cyber Security News (7)
  • Wireless (7)
  • WPA (1)
  • WPA2 (1)
  • February 2019 (1)
  • September 2018 (3)
  • August 2018 (5)
  • July 2018 (3)
  • October 2017 (1)
  • March 2014 (2)
  • December 2012 (3)
  • May 2012 (12)
  • May 2011 (16)
anti-virus AS/400 bank banks Cross-Site Request Forgery Cross-Site Scripting cryptography data breach data privacy Data Protection e-commerce security Facebook fraud hack hackers IBM IoT operating system Patch phishing RBI Red Team Assessment SAP scams security Security Audit Server ssl System System Architecture

Recent Posts

  • data-breach Data Breach : 5 Security Misconceptions
    February 4, 2019
  • sports-day-1 Sports Day: Back To School
    September 26, 2018
  • Red Team Security Brigade. Red Team: How We Compromised A Banks’ Network
    September 22, 2018
  • google play store trojan Weekly Cyber Security News: 3rd September 2018
    September 3, 2018
  • IBM AS/400 System Security Audit of IBM AS/400 and System i : Part 2
    August 22, 2018

Categories

  • Databases (9)
    • MSSQL (4)
    • MySQL (1)
    • Oracle (4)
  • Frameworks (1)
    • Spring MVC (1)
  • Languages (20)
    • .NET (5)
    • ASP (5)
    • Java (6)
    • JSP (2)
    • PHP (6)
  • Office Events (1)
  • Recommendations (18)
    • Data Breaches (1)
    • Input Validation (14)
    • Insecure Cryptographic Storage (1)
    • Phishing Attacks (1)
    • Redirect Abuse (1)
  • Red Team (1)
  • Security Attacks (16)
    • Cross-Site Request Forgery (1)
    • Cross-Site Scripting (3)
    • KRACK (1)
    • SQL Injection (11)
  • Security Audit (2)
    • IBM AS/400 (2)
  • Weekly Cyber Security News (7)
  • Wireless (7)
    • MAC Address Filtering (1)
    • SSID (2)
    • WPA (1)
    • WPA2 (1)

About Security Brigade

Security Brigade a CERT-In empanelled founded on the core belief that "Great audits are done by great auditors - not expensive tools". Our proprietary E.D.I.T.E platform provides a workflow based testing engine that encapsulates the complete audit process. It allows expert auditors to focus on in-depth manual testing while assisted by a combination of proprietary, open-source and commercial technology.
Read More about SB

Archives

  • February 2019 (1)
  • September 2018 (3)
  • August 2018 (5)
  • July 2018 (3)
  • October 2017 (1)
  • March 2014 (2)
  • December 2012 (3)
  • May 2012 (12)
  • May 2011 (16)

Social Icons

  • Twitter
  • Facebook
  • LinkedIn
  • Instagram

Tag Cloud

anti-virus AS/400 bank banks Cross-Site Request Forgery Cross-Site Scripting cryptography data breach data privacy Data Protection e-commerce security Facebook fraud hack hackers IBM IoT operating system Patch phishing RBI Red Team Assessment SAP scams security Security Audit Server ssl System System Architecture
Made with ❤ at Security Brigade © 2020 All rights reserved.