Along of my process solving CTF and VBD challenges I’ve noted that When I face challenges relationship with SQLi or those in which I must find and exploit that kind of vulnerability. I’m having some problems to solve them and It’s clear that I have to work so hard in this subject if I want to solve challenges with higher difficult level.
What do you understand or find about that problem
I think that nowadays there are several methodologies to do a SQLi attack and until this moment I’ve explored and studied only some of them.
You make any workaround? What did you do?
Clearly I’ve been searching information relationship with this subject in internet. However until this moment I feel that although I’ve strengthened my knowledge in this topic. It’s clear that I have a large number of techniques to learn in this area.
It can see below some of the consulted bibliography
I need help with
I’d like that some of you who know and have find out a large number of techniques to carry out this kind of attack to advice or recommend me bibliographic specialized material or any kind of learning advanced material which could help me to improve my knowledge and skills to solve more difficult challenges and learn more about in this field.