YoVDO

Mirror Mirror - Reflected PDF Attacks Using SQL Injection

Offered By: YouTube

Tags

SQL Injection Courses Web Application Security Courses Vulnerability Assessment Courses Data Exfiltration Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a conference talk from BSides Las Vegas 2012 that delves into the intricacies of reflected PDF attacks using SQL injection. Learn from security experts Shawn Asmus and Kristov Widak as they present "Mirror Mirror," a 51-minute session that uncovers vulnerabilities in PDF generation processes. Gain insights into how attackers can exploit SQL injection flaws to manipulate PDF content, potentially leading to data exfiltration or malicious code execution. Understand the techniques used in these attacks and discover strategies to mitigate risks associated with dynamically generated PDFs in web applications.

Syllabus

2.1.5 Shawn Asmus, Kristov Widak Mirror Mirror -- Reflected PDF Attacks using SQL Injection


Related Courses

Python 3 For Offensive PenTest: A Complete Practical Course
Udemy
Python for Command-and-control, Exfiltration and Impact
Infosec via Coursera
Network Analysis with Arkime
Pluralsight
Cisco Core Security: Secure Network Access, Visibility, and Enforcement
Pluralsight
Post Exploitation with Meterpreter
Pluralsight