> > > tested it).
> > > >
> > > > Of course if you are paying proper attention to security you should
> > > already
> > > > be onto the SQL injection vectors that put ATTACH in user's hands
> > anyway
> > > :)
> > > >
> &
ying proper attention to security you should
> > already
> > > be onto the SQL injection vectors that put ATTACH in user's hands
> anyway
> > :)
> > >
> > > -Rowan
> > >
> > > On 16 November 2016 at 07:10, jungle Boogie <jungleboog...@gmail.com&g
r's hands anyway
> :)
> >
> > -Rowan
> >
> > On 16 November 2016 at 07:10, jungle Boogie <jungleboog...@gmail.com>
> > wrote:
> >
> > > Hi All,
> > >
> > > Pretty interesting article:
> > > https://www.invincealabs.com/bl
already
> be onto the SQL injection vectors that put ATTACH in user's hands anyway :)
>
> -Rowan
>
> On 16 November 2016 at 07:10, jungle Boogie <jungleboog...@gmail.com>
> wrote:
>
> > Hi All,
> >
> > Pretty interesting article:
> > https://www.invi
in user's hands anyway :)
-Rowan
On 16 November 2016 at 07:10, jungle Boogie <jungleboog...@gmail.com> wrote:
> Hi All,
>
> Pretty interesting article:
> https://www.invincealabs.com/blog/2016/11/sqlite-shell-script/
>
> This post documents how we were able to create a SQ
Hi All,
Pretty interesting article:
https://www.invincealabs.com/blog/2016/11/sqlite-shell-script/
This post documents how we were able to create a SQLite database that
can be executed as an ash shell script purely from SQL queries.
Found here:
https://www.reddit.com/r/netsec/comments/5cwb07
6 matches
Mail list logo