Sunday, August 11, 2019

SELECT code_execution FROM * USING SQLite: Eggheads lift the lid on DB security hi-jinks

You’ve heard of ROP? Now get a load of QOP

DEF CON  At the DEF CON hacking conference in Las Vegas on Saturday, infosec gurus from Check Point are scheduled to describe a technique for exploiting SQLite, a database used in applications across every major desktop and mobile operating system, to gain arbitrary code execution.…

The Register – Security
Secure Hunter Anti -Malware

The post SELECT code_execution FROM * USING SQLite: Eggheads lift the lid on DB security hi-jinks appeared first on Secure Hunter Anti-Malware.



https://ift.tt/2YGzvHf
Secure Hunter

No comments:

Post a Comment