Nytro Posted November 18, 2013 Report Posted November 18, 2013 Advanced SQL InjectionPresented By:Joe McCrayjoe - learnsecurityonline.comhttp://twitter.com/j0emccrayJoe McCray | LinkedInStep 1: Tell customer you are 31337 security professionalCustomers only applied patches if it fixed something on the systemIt was common practice NOT to apply system updates that didn't fix a problem you wereexperiencing on a system (WTF ARE YOU DOING -YOU MIGHT BREAK SOMETHING!!!!!)Step 2: Scan customer network with ISS or Nessus if you were a renegadeCustomers didn't apply patches, and rarely even had firewalls and IDSs back thenYou know you only ran ISS because it had nice reports...Step 3: Break out your uber 31337 warez and 0wn it all!!!!!You only kept an exploit archive to save time (Hack.co.za was all you needed back then)If you could read the screen you could 0wn the network!!!!!!!Download:[URL]https://www.defcon.org/images/defcon-17/dc-17-presentations/defcon-17-joseph_mccray-adv_sql_injection.pdf[/URL] Quote