{"id":843,"date":"2013-08-28T15:01:00","date_gmt":"2013-08-28T15:01:00","guid":{"rendered":"https:\/\/www-new.brucon.org\/2018\/2013\/08\/28\/brucon-training-in-the-spotlights-the-art-of-exploiting-injection-flaws\/"},"modified":"2013-08-28T15:01:00","modified_gmt":"2013-08-28T15:01:00","slug":"brucon-training-in-the-spotlights-the-art-of-exploiting-injection-flaws","status":"publish","type":"post","link":"https:\/\/archive.brucon.org\/2018\/2013\/08\/28\/brucon-training-in-the-spotlights-the-art-of-exploiting-injection-flaws\/","title":{"rendered":"BruCON training in the spotlights: &#8220;The Art of Exploiting Injection Flaws&#8221;"},"content":{"rendered":"<div dir=\"ltr\" style=\"text-align: left\"><a href=\"http:\/\/1.bp.blogspot.com\/-Fnv28aLpjrw\/Uh4QTE9JqqI\/AAAAAAAAFiM\/xmAjVo_krH0\/s1600\/spotlights.jpg\" style=\"clear: left;float: left;margin-bottom: 1em;margin-right: 1em\"><img border=\"0\" height=\"215\" src=\"http:\/\/1.bp.blogspot.com\/-Fnv28aLpjrw\/Uh4QTE9JqqI\/AAAAAAAAFiM\/xmAjVo_krH0\/s320\/spotlights.jpg\" width=\"320\" \/><\/a>We have some great <a href=\"http:\/\/2013.brucon.org\/index.php\/Training\" target=\"_blank\">trainings<\/a> lined up for you at BruCON this year.<br \/>Just to make it even harder for you to choose one, we will put some of these trainings in the spotlight.<\/p>\n<p>We start with&nbsp;<a href=\"http:\/\/2013.brucon.org\/index.php\/Training_Injection\" target=\"_blank\">The Art of Exploiting Injection Flaws<\/a>,&nbsp;taught by Sumit \u2018Sid\u2019 Siddharth. Sid is the contributing author of the book <a href=\"http:\/\/www.amazon.com\/Injection-Attacks-Defense-Second-Edition\/dp\/1597499633\" target=\"_blank\">SQL Injection: Attacks and Defense (2nd Edition)<\/a>. We caught up with Sid and asked him what the USPs of the course are:<\/p>\n<p><b><u>Sid:<\/u><\/b>&nbsp;<i>&#8220;If you do penetration testing or security consultancy as a day job and want to take your skills to the next level, then this is the right course for you. In the class we focus on Injection Flaws and only Injection Flaws and cover the topic inside out. We don\u2019t teach people how to use sqlmap to exploit sql injection but give people deep underlying concepts so that they know when a tool is going to work and how the tool does work. So, next time when the tool gives up working, they are not stuck.&nbsp;<\/i><br \/><i><br \/><\/i><i>To elaborate a bit more on this:<\/i><br \/><i>So, everyone\u2019s favourite tool is BURP Professional to carry out web pentesting. What are the SQL Injection checks which burp does and more importantly what it doesn\u2019t do? Anyone who has experience with BURP scanner would have noticed 1 particular check where it injects the query \u201cselect 1\u201d and then inject \u201cselect 1,2\u201d and based on the response often reports it as false positive SQLI. Fair enough! But why does it do that? And what happens when this 1 time out of 10 it\u2019s not a false positive?<\/i><br \/><i><br \/><\/i><i>This is not a 101 class, we expect audience to have a basic understanding of app security, familiarisation with SQL language and OWASP standards. We cover advance topics such as 2nd order injection, injection in stored procedures, double encoding\/decoding etc.<\/i><br \/><i>The 2nd day is also niche stuff which hasn\u2019t received as much coverage as SQL Injection. So, we cover:<\/i><\/p>\n<ul style=\"text-align: left\">\n<li><i>Hibernate Query language Injection (ORM)<\/i><\/li>\n<li><i>LDAP Injection<\/i><\/li>\n<li><i>XPATH Injection<\/i><\/li>\n<li><i>XXE<\/i><\/li>\n<\/ul>\n<p><i>Again, we don\u2019t just touch the surface, but we go deep dive into topics like Blind LDAP\/XPATH injection; XPath 2.0; combining XPath and XXE to do more fun stuff!<\/i><br \/><i>A lot of people have told me that they have never seen XPath injection in the wild. I myself didn\u2019t see it until I researched the topic and in last 2 years, I have seen a fair few of them. They say, knowledge is power, for a reason ;-)&#8221;<\/i><\/p>\n<p>There are a bunch of teaser slides about the course which can be found here:<br \/><a href=\"http:\/\/www.slideshare.net\/notsosecure\/injection-flaw-teaser\">http:\/\/www.slideshare.net\/notsosecure\/injection-flaw-teaser<\/a><\/p>\n<p><b><u>Sid:<\/u><\/b>&nbsp;<i>&#8220;While I have delivered this class many times at Black Hat, Appsec etc, this is my first brucon. So, I am quite excited about it and hope to have a good turnout.<\/i>&#8220;<\/p>\n<p>details and registration link are available on the BruCON web site:&nbsp;<a href=\"http:\/\/2013.brucon.org\/index.php\/Training_Injection\" target=\"_blank\">here<\/a>.<\/p>\n<p>regards<\/p>\n<p>The BruCON crew<\/p>\n<div><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>We have some great trainings lined up for you at BruCON this year.Just to make it even harder for you to choose one, we will put some of these trainings in the spotlight. We start with&nbsp;The Art of Exploiting Injection Flaws,&nbsp;taught by Sumit \u2018Sid\u2019 Siddharth. Sid is the contributing author of the book SQL Injection: Attacks and Defense (2nd Edition). We caught up with Sid and asked him what the USPs of the course are:&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-843","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized"},"menu_order":0,"_links":{"self":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts\/843","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/comments?post=843"}],"version-history":[{"count":0,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/posts\/843\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/media?parent=843"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/categories?post=843"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.brucon.org\/2018\/wp-json\/wp\/v2\/tags?post=843"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}