Being a Security Tester, I have one of the most teasing and innovative jobs in my profession. We, testers, are asked to identify as many major security vulnerabilities in the application, given limited time and resources. We have the constraint to explore the application in lesser time than the developers who build the application. We have to discover all the vulnerabilities present in the application, while the hacker conveniently has all the time and resources to do that. Well, that’s what makes this job interesting and challenging.

As SQL injection continues to be the dominant technique for data fraud, I would like to dedicate this blog to the topic in an effort to eliminate this problem. Let’s get started on the basics of how to identify an injection. Continue reading »

Tags: Testing | Comments Off


Archives

2016
2015
2014
2013
2012
Congruent Facebook Twitter Slideshare