![db browser for sqlite safe db browser for sqlite safe](http://designermag.org/wp-content/uploads/2014/02/SQlite-manager.png)
Welcome to the brave new world of using the familiar Structured Query Language for exploitation primitives. Furthermore, many of the primitives presented here are not exclusive to SQLite and can be ported to other SQL engines. Given the fact that SQLite is practically built-in to every major OS, desktop or mobile, the landscape and opportunities are endless. We hope that by releasing our research and methodology, the security research community will be inspired to continue to examine SQLite in the countless scenarios where it is available. We demonstrate these techniques a couple of real-world scenarios: pwning a password stealer backend server, and achieving iOS persistency with higher privileges. Using our innovative techniques of Query Hijacking and Query Oriented Programming, we proved it is possible to reliably exploit memory corruptions issues in the SQLite engine. In our long term research, we experimented with the exploitation of memory corruption issues within SQLite without relying on any environment other than the SQL language. We believe that this is just the tip of the iceberg. However, from a security perspective, it has only been examined through the lens of WebSQL and browser exploitation.
DB BROWSER FOR SQLITE SAFE SOFTWARE
SQLite is one of the most deployed software in the world.
![db browser for sqlite safe db browser for sqlite safe](https://www.excel-ubara.com/vba_sql/image65.jpg)
SELECT code_execution FROM * USING SQLite ĪugGaining code execution using a malicious SQLite database