Advanced MySQL Exploitation Muhaimin Dzulfakar Black Hat - USA - 2009

Subscribers:
6,000
Published on ● Video Link: https://www.youtube.com/watch?v=bg5EBWpxUeI



Duration: 18:36
14 views
0


Advanced MySQL Exploitation

This talk focuses on how MySQL SQL injection vulnerabilities can be used to gain remote code execution on the LAMP and WAMP environments. Attackers performing SQL injection on a MySQL platform must deal with several limitations and constraints. For example, the lack of multiple statements in one query makes MySQL an unpopular platform for remote code execution compared to other platforms. This talk will show that arbitrary code execution is possible on the MySQL platform and explain the techniques. In this presentation, the author will demonstrate the tool he wrote, titled MySqloit. This tool can be integrated with metasploit and is able to upload and execute shellcodes using a SQL Injection vulnerability in LAMP or WAMP environments.

Black Hat - USA - 2009 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2021-12-28Re-conceptualizing Security Bruce Schneier Black Hat - USA - 2009
2021-12-28Hacking the Smart Grid Tony Flick Black Hat - USA - 2009
2021-12-28A Black Hat Vulnerability Risk Assessment Panel Black Hat - USA - 2009
2021-12-28Cloudburst Hacking 3D and Breaking Out of VMware Kostya Kortchinsky Black Hat - USA - 2009
2021-12-28How Economics and Information Security Affects Cyber Crime Peter Guerra Black Hat - USA - 2009
2021-12-28I Just Found 10 Million SSNs Alessandro Acquisti Black Hat - USA - 2009
2021-12-28Computer Crime Year in Review Jennifer Granick Black Hat - USA - 2009
2021-12-28Advanced Mac OS X Rootkits Dino Dai Zovi Black Hat - USA - 2009
2021-12-28Lockpicking Forensics Datagram Black Hat - USA - 2009
2021-12-28Internet Special Ops Andrew Fried, Paul Vixie, Christopher Lee Black Hat - USA - 2009
2021-12-28Advanced MySQL Exploitation Muhaimin Dzulfakar Black Hat - USA - 2009
2021-12-28Long-Term Sessions: This Is Why We Can't Have Nice Things Steve Ocepek
2021-12-28CSO Panel Black Hat Strategy Meeting Panel Black Hat - USA - 2009
2021-12-28Introducing Ring 3 Rootkits Alexander Tereshkin & Rafal Wojtczuk Black Hat - USA - 2009
2021-12-28Analyzing Security Research in the Media Panel Black Hat - USA - 2009
2021-12-28Macsploitation with Metasploit Dino Dai Zovi Black Hat - USA - 2009
2021-12-28Managed Code Rootkits Erez Metula Black Hat - USA - 2009
2021-12-28Is That You, Baby, or Just a Bridge in the Sky Black Hat - USA - 2009
2021-12-28Anti Forensics The Rootkit Connection Bill Blunden Black Hat - USA - 2009
2021-12-28MD5 Collisions Marc Bevand Black Hat - USA - 2009
2021-12-28DC Panel Update from Washington Panel Black Hat - USA - 2009



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
learn
how to
2022
2021
cybersecurity
break in
google
securing
exploit
recon
social engineering
MUHAIMIN DZULFAKAR