SlideShare a Scribd company logo
  • Upload
  • Home
  • Explore
  • Login
  • Signup
SlideShare a Scribd company logo
  • Home
  • Explore
  • Upload
  • Login
  • Signup

We've updated our privacy policy. Click here to review the details. Tap here to review the details.

×
×
×
×
×
×
Bernardo Damele A. G.

Bernardo Damele A. G.

151 Followers
9 SlideShares 0 Clipboards 151 Followers 1 Following
  • Unblock User Block User
9 SlideShares 0 Clipboards 151 Followers 1 Following

Personal Information
Organization / Workplace
London United Kingdom
Occupation
Computer Security Consultant
Website
bernardodamele.blogspot.com
Contact Details
Tags
sqlmap sqlinjection bulletin bof metasploit meterpreter mysql postgresql mssql dll inject reverse bind binary file buffer shell overflow heap text webapp security anti linux forensics registry
See more
Presentations (8)
See all
SQL injection exploitation internals
14 years ago • 3197 Views
SQL injection: Not only AND 1=1
14 years ago • 19932 Views
Advanced SQL injection to operating system full control (slides)
14 years ago • 20053 Views
Advanced SQL injection to operating system full control (short version)
14 years ago • 1847 Views
Advanced SQL injection to operating system full control (short version)
14 years ago • 3046 Views
SQL injection: Not Only AND 1=1 (updated)
13 years ago • 17950 Views
Expanding the control over the operating system from the database
13 years ago • 9737 Views
Got database access? Own the network!
12 years ago • 8234 Views
Documents (1)
Advanced SQL injection to operating system full control (whitepaper)
12 years ago • 33251 Views
Likes (1)
NCC Group 44Con Workshop: How to assess and secure ios apps
NCC Group • 9 years ago
  • Activity
  • About

Presentations (8)
See all
SQL injection exploitation internals
14 years ago • 3197 Views
SQL injection: Not only AND 1=1
14 years ago • 19932 Views
Advanced SQL injection to operating system full control (slides)
14 years ago • 20053 Views
Advanced SQL injection to operating system full control (short version)
14 years ago • 1847 Views
Advanced SQL injection to operating system full control (short version)
14 years ago • 3046 Views
SQL injection: Not Only AND 1=1 (updated)
13 years ago • 17950 Views
Expanding the control over the operating system from the database
13 years ago • 9737 Views
Got database access? Own the network!
12 years ago • 8234 Views
Documents (1)
Advanced SQL injection to operating system full control (whitepaper)
12 years ago • 33251 Views
Likes (1)
NCC Group 44Con Workshop: How to assess and secure ios apps
NCC Group • 9 years ago
Personal Information
Organization / Workplace
London United Kingdom
Occupation
Computer Security Consultant
Website
bernardodamele.blogspot.com
Tags
sqlmap sqlinjection bulletin bof metasploit meterpreter mysql postgresql mssql dll inject reverse bind binary file buffer shell overflow heap text webapp security anti linux forensics registry
See more

Modal header

  • About
  • Support
  • Terms
  • Privacy
  • Copyright
  • Cookie Preferences
  • Do not sell or share my personal information
English
Current Language: English
Español
Português
Français
Deutsch

© 2023 SlideShare from Scribd

We've updated our privacy policy.

We’ve updated our privacy policy so that we are compliant with changing global privacy regulations and to provide you with insight into the limited ways in which we use your data.

You can read the details below. By accepting, you agree to the updated privacy policy.

Thank you!

View updated privacy policy
We've encountered a problem, please try again.