Do You Know Where Your SQL Injection Vulnerabilities Are?

It’s probable that you haven’t identified all of your SQL injection vulnerabilities, especially if you operate mobile applications, web services and RIAs, which typically have been developed in new technologies like REST, JSON and AJAX. While security teams are often effective at testing for SQLi vulnerabilities in classic HTML applications over GET and POST, most testing methodologies do not handle the new formats. As a result, web applications using these recent technologies are often littered with SQL injection and other security vulnerabilities.

Over the past few years, Dan Kuykendall, co-CEO and CTO at NT OBJECTives, has researched this problem and has developed innovative strategies for finding SQL injection vulnerabilities in applications that utilize REST, JSON and AJAX.

Fill out the short form on the right to view our informative web cast, in which Dan discusses:

  • Why SQL injection vulnerabilities are so prevalent in these technologies, despite the fact that we have understood SQLi for a long time.
  • How to understand these newer formats (JSON, REST, SOAP) and find SQL injection vulnerabilities in several technologies commonly used in these applications.
  • How you can scale your testing to automatically find these vulnerabilities.

Want to learn more about preventing SQL injection vulnerabilities? Call 1-877-NTO-WEBS or contact NTO online to discuss your specific security needs with our experts and find out more about our comprehensive suite of security testing software.

Presenter

Dan Kuykendall

NT OBJECTives, Inc.
Co-CEO & CTO

Watch Webcast

Provide the following information to have this webcast emailed to you.