Bug hunting is the process of finding bugs in software or hardware. As people in the security domain, we use this term to describe the process of finding security-critical software bugs. Security-critical bugs also called software security vulnerabilities. These vulnerabilities might allow an attacker to remotely compromise systems, escalate local privileges, cross privilege boundaries, or otherwise wreak havoc on a system.
In the previous post, I started to recap the notorious web application attack, SQL Injection. And I plan to go deeper by examining its types and exploitation techniques. So, today, there is one of the techniques on the menu, Error-Based SQL injection. Ok, fasten your seat belts.