Vignesh Krishnan
Vignesh Krishnan
CC#
Created by Vignesh Krishnan on 3/25/2024 in #help
Securing Request Data in .NET Framework C# Application
Still, the HTTP request has been visible. I think the Echo Mirage tool is reading the memory of the application that is running in the process. So, does anyone suggest any idea, or DLL, sample code to detect unauthorized hooking or injecting in the .NET Framework application process?
31 replies
CC#
Created by Vignesh Krishnan on 3/25/2024 in #help
Securing Request Data in .NET Framework C# Application
No description
31 replies
CC#
Created by Vignesh Krishnan on 1/24/2024 in #help
Securing .NET Framework Applications Against SQL Injection: Unraveling Windows SSL Vulnerabilities
Thanks @ZZZZZZZZZZZZZZZZZZZZZZZZZ @jIMMACLE
33 replies
CC#
Created by Vignesh Krishnan on 1/24/2024 in #help
Securing .NET Framework Applications Against SQL Injection: Unraveling Windows SSL Vulnerabilities
If I create a web API in .NET Core that connects to the database, and I host the API in IIS on remote servers, is it possible to see SQL queries during the API to database communication
33 replies
CC#
Created by Vignesh Krishnan on 1/24/2024 in #help
Securing .NET Framework Applications Against SQL Injection: Unraveling Windows SSL Vulnerabilities
Thanks
33 replies
CC#
Created by Vignesh Krishnan on 1/24/2024 in #help
Securing .NET Framework Applications Against SQL Injection: Unraveling Windows SSL Vulnerabilities
Thank you for your assistance @ZZZZZZZZZZZZZZZZZZZZZZZZZ and @jcotton42 . I've been working on .NET Windows applications for the past six months, having graduated last year and am still in the process of learning the .NET framework. I would appreciate any project or documentation references for implementing an API layer to connect to a database. This information would be valuable for me to propose a solution.
33 replies
CC#
Created by Vignesh Krishnan on 1/24/2024 in #help
Securing .NET Framework Applications Against SQL Injection: Unraveling Windows SSL Vulnerabilities
The application was created using VB6, and it is a legacy project. We are currently facing issues, and after conducting a proof of concept (POC), we found that directly connecting the .NET Framework to the database and encrypting it could resolve the problem. Our plan is to use the resulting DLL in the legacy project, ensuring that queries remain hidden. Changing the current architecture is not easily feasible and requires a significant effort. Hence, I am seeking suggestions that involve less effort. Alternatively, I could propose the implementation of an API layer
33 replies
CC#
Created by Vignesh Krishnan on 1/24/2024 in #help
Securing .NET Framework Applications Against SQL Injection: Unraveling Windows SSL Vulnerabilities
Is there any other workaround to prevent the reading of SQL queries used in a .NET application?
33 replies
CC#
Created by Vignesh Krishnan on 1/24/2024 in #help
Securing .NET Framework Applications Against SQL Injection: Unraveling Windows SSL Vulnerabilities
Ok
33 replies
CC#
Created by Vignesh Krishnan on 1/24/2024 in #help
Securing .NET Framework Applications Against SQL Injection: Unraveling Windows SSL Vulnerabilities
I have configured the self-signed SSL certificate on the remote server where the SQL Server is hosted and enabled force encryption
33 replies
CC#
Created by Vignesh Krishnan on 1/24/2024 in #help
Securing .NET Framework Applications Against SQL Injection: Unraveling Windows SSL Vulnerabilities
Yeah
33 replies