Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

+ - Capturing The Flag, SQLi-Style->

Submitted by CowboyRobot
CowboyRobot (671517) writes "Penetration tester and long-time security professional Sumit "Sid" Siddharth has developed a real-world SQL injection sandbox simulator, and invites the public for a capture the flag event later this month. "The only way you can understand the true impact of vulnerabilities is by practicing exploitation. Even vulnerability identification goes hand-in-hand with exploitation," says Siddharth. "Sometimes identifying the vulnerability is really difficult, and it's only when you know advanced exploitation techniques that you can do so. "We've also put together some really nice examples where identifying the vulnerability is really difficult, and we've asked people to find the needle in the haystack because that's how websites get compromised at the end of the day,""
Link to Original Source
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

Capturing The Flag, SQLi-Style

Comments Filter:

Somebody's terminal is dropping bits. I found a pile of them over in the corner.

Working...