An informative guide for using blind SQL injection on web services during penetration tests, using Python. There is plenty of documentation for using blind SQL injection in penetration tests. This code demonstrates exploiting blind SQL injection in a web service using Python. We often come across blind SQL injection in penetration tests, and SQL injection in web services […]
Category: researchblog
Common ISO 27001 Gaps
Based on a review of 20 gap audit reports for a variety of organizations, this article should help your organization if you are considering ISO 27001, or wish to ensure you comply with best practice. Common-ISO-27001-Gaps.pdf (1.16 MB)
Application Penetration Testing Versus Vulnerability Scanning
This article demonstrates real-world examples of the different types of flaws found only through manual testing. Application-Penetration-Testing-Versus-Vulnerability-Scanning.pdf (823 KB)