SQL Injection Cheat Sheet: How to Prevent Attacks

SQL injection takes place when database software can’t tell the difference between arbitrary data from the user and genuine commands from the application. When an attacker injects commands into the data they send to a database, they can take database control away from the application owner. Read full news article on Dzone  

Web Application Penetration Testing Checklist

Web Application Pen testing is a method of identifying, analyzing and Report the vulnerabilities which is existing in the Web application including buffer overflow, input validation, code Execution, Bypass Authentication, SQL Injection, CSRF, Cross sight scripting in the target web Application which is given for Penetration Testing. Repeatable Testing and Conduct a serious of method … Read more