4 out of 5
4
6 reviews

SQL Injection

Hack and protect yourself from SQL Injection. What Will I Learn? Practice various different types of SQL Injection vulnerabilities Learn advanced Identification techniques by which you can spot a SQL Injection Learn advanced exploitation techniques by which you can determine the true impact of the vulnerability Evaluate various security scanners/tools and see which tool does [...]
38 students enrolled

Hack and protect yourself from SQL Injection.

What Will I Learn?

  • Practice various different types of SQL Injection vulnerabilities
  • Learn advanced Identification techniques by which you can spot a SQL Injection

  • Learn advanced exploitation techniques by which you can determine the true impact of the vulnerability

  • Evaluate various security scanners/tools and see which tool does what
  • Learn to distinguish between a false positive and a real vulnerability

Description

In this course, you’ll learn how to communicate with relational databases through SQL. how to manipulate data and build queries that communicate with more than one table.

WHY LEARN SQL?

people search through data to find insights to inform strategy, marketing, operations, and a plethora of other categories.
There are a ton of businesses that use large, relational databases, which makes a basic understanding of SQL a great employable skill not only for data scientists, but for almost everyone.

Introduction to SQl Injection

1
Introduction
1:15
2
Installing WAMP
6:10
3
Installing XAMPP
1:49
4
Creating Database
00:54
5
Drop Database
00:58
6
SQL Create Table
1:53
7
Rename Table
00:43
8
Update Command
1:06
9
Where Clause
00:51
10
Alias Name
00:53
11
SQL Aggregate Function Min, Max,Count,Avg,Sum
4:07

SQL Introduction Injection

1
Introduction
1:15
2
Testing by Inference
2:00

Testing For SQL Injection

1
Checking Vulnerable Websites
2:09
2
Manipulating Parameters
2:00
3
Terminating SQL Injections
7:24
4
Automating SQL Injection Exploitation
2:33
5
Inline SQL Injection Practice
1:50

Blind SQL Injection exploitation

1
Blind SQL Fingerprint Practice
1:22
2
Boolean Blind SQL Injection Exploiting
4:22
3
Time-Based Techniques
1:04

Exploiting SQL Injection

1
Non blind Fingerprint
2:12
2
SQL Injection Ajax
2:17
3
Burp Suite Intercepting a post request
3:35
4
Extracting Data Through Union Statement
4:46
5
Extracting Data Through Union Statements 1
2:16
6
Extracting Data Through Union statements 2
2:50
7
Extracting Data Through Union statements 3
4:24
8
Extracting Data Through Union statements 4
2:56
9
SQL Remote Code Execution
3:12
10
Making Your User into an Admin source code
4:25

SQL Injection Prevention

1
SQL Prevention
3:43
2
SQL Injection Insertion demo
3:13
3
Code Review for SQL Injection PHP Code
2:17
4
Prevent SQL injection in PHP Insertion
4:53
5
Delete SQL Injection
1:50
6
Prevent SQL Injection in PHP Delete
3:11
7
Prepare SQL Injection on Update
3:28
8
SQL Injection on Update
3:35
9
Prevent SQL injection in PHP Select
2:01

SQL Injection scanning and Exploitation Tools

1
JSQL Injection Tool
2:37
2
JSQL Demo
3:04

Code Level Defenses and Advanced Topics

1
Extracting MySQL Server Configuration and Information
3:01
2
Hybrid Attacks on SQL Injection with XSS
3:31
3
Handling Sensitive Data
1;55
4
Variations on a Theme
2:20
5
Encoding Output
1:32
6
Attacking the Database Server
2:07
7
Anatomy of an SQl Injection Attack
2:33
8
Extracting MySQL Server Configuration Information
3:01

SQL Injection Bug Reports

1
SQL Injection Report
3:28
2
SQL Injection on Uber Report
2:01
4
4 out of 5
6 Ratings

Detailed Rating

Stars 5
3
Stars 4
0
Stars 3
3
Stars 2
0
Stars 1
0

{{ review.user }}

{{ review.time }}
 

Show more
Please, login to leave a review
SQL Injection
30-Day Money-Back Guarantee

Includes

9 hours
Full lifetime access
Access on mobile and TV
SQL Injection
Category:
4 out of 5
4
6 reviews
Price:
Free