FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
Yesterday β€” November 26th 2025Your RSS feeds

Prepared Statements? Prepared to Be Vulnerable.

Think prepared statements automatically make your Node.js apps secure? Think again.

In my latest blog post, I explore a surprising edge case in the mysql and mysql2 packages that can turn β€œsafe” prepared statements into exploitable SQL injection vulnerabilities.

If you use Node.js and rely on prepared statements (as you should be!), this is a must-read: https://blog.mantrainfosec.com/blog/18/prepared-statements-prepared-to-be-vulnerable

submitted by /u/eqarmada2
[link] [comments]
Before yesterdayYour RSS feeds

Automated Function ID Database Generation in Ghidra on Windows

Been working with Function ID databases lately to speed up RE work on Windows binaries β€” especially ones that are statically linked and stripped. For those unfamiliar, it’s basically a way to match known function implementations in binaries by comparing their signatures (not just hashes β€” real structural/function data). If you’ve ever wasted hours trying to identify common library functions manually, this is a solid shortcut.

A lot of Windows binaries pull in statically linked libraries, which means you’re left with a big mess of unnamed functions. No DLL imports, no symbols β€” just a pile of code blobs. If you know what library the code came from (say, some open source lib), you can build a Function ID database from it and then apply it to the stripped binary. The result: tons of auto-labeled functions that would’ve otherwise taken forever to identify.

What’s nice is that this approach works fine on Windows, and I ended up putting together a few PowerShell scripts to handle batch ID generation and matching. It's not a silver bullet (compiler optimisations still get in the way), but it saves a ridiculous amount of time when it works.

submitted by /u/eqarmada2
[link] [comments]
❌