March 21, 2023, 1:30 p.m. |

cylab.be cylab.be

In a previous blog post, we have explained what SQL injection is, and how to exploit it using sqlmap. In this blog post, we will show some additional techniques: how to exploit web applications that use clean URLs, how to exploit a POSTed form, how to hide traces etc.

applications blog blog post etc explained exploit hide injection sql sql injection sqlmap techniques traces urls web web applications

Security Analysis Senior Analyst

@ NTT DATA | Bengaluru, KA, IN

SAP NS2 SIEM Engineering Manager - Herndon (Hybrid)

@ SAP | Herndon, VA, US, 20171

Security Architect - Infrastructure

@ Yorkshire Water | Bradford, GB

Information System Security Officer, Journeyman (Secret)

@ Resource Management Concepts, Inc. | Patuxent River, Maryland, United States

Technology Information Security GRC Senior

@ KPMG India | Gurgaon, Haryana, India

Principal CyberSecurity Engineer

@ DTCC | Dallas, TX, United States