Security flaws of storing strings and some of its substrings using Microsoft SQL Server Transparent Data Encryption?

I am creating a database table with an encrypted value, say users:

Say John encrypted is U2FsdGVkX193AOGlBRE1RNScJRGN9vSB4erIljJwaKw=.

UserId | Name
—— | ——————————————–
1 | U2FsdGVkX19… Continue reading Security flaws of storing strings and some of its substrings using Microsoft SQL Server Transparent Data Encryption?

What are the security implications of allowing API consumer to decide primary key stored in database?

Story

We are developing an API that which allow consumer to create or modify (i.e. upsert) objects stored in database via an endpoint with HTTP PUT.

The primary key of the object stored in this way is a GUID instead of an a… Continue reading What are the security implications of allowing API consumer to decide primary key stored in database?

How do you perform SQL injection on a login form that checks for email address format?

A recent employment test prompted me to perform an SQL injection to gain access into their website.

Using manual and automated (Burp) methods, I was able to find out the form is definitely vulnerable to SQL Injection attacks, but every ti… Continue reading How do you perform SQL injection on a login form that checks for email address format?

Amazon migrates more than 100 consumer services from Oracle to AWS databases

AWS and Oracle love to take shots at each other, but as much as Amazon has knocked Oracle over the years, it was forced to admit that it was in fact a customer. Today in a company blog post, the company announced it was shedding Oracle for AWS databases, and had effectively turned off its […] Continue reading Amazon migrates more than 100 consumer services from Oracle to AWS databases