Abstract

Injection vulnerabilities are often found in SQL, LDAP, XPath, or NoSQL queries, OS commands, XML parsers, SMTP headers, expression languages, and ORM queries. Ravi will present various injection techniques in various technologies.

In Second अध्याय you will get following Injection
1. SQL Injection
2. NoSQL Injection
3. ORM Injection

Speaker

_RaviRamesh

Ravi is a Senior manager at Net Square, providing cutting edge information security services to clients around the globe. He has an M.C.A. from UTU University. His work bug hunting and responsible disclosure has led him to the Hall Of Fame for Google, Microsoft, Apple, Oracle and many more. He has been performing Web Application, iOS and Android pentests and leads Net Square’s professional services team.

Timing

Starts at Sunday June 14 2020, 11:30 AM. The sessions runs for about 2 hours.

Resources