What Will I Learn?
- Practice various different types of SQL Injection vulnerabilities
-
Learn advanced Identification techniques by which you can spot a SQL Injection
-
Learn advanced exploitation techniques by which you can determine the true impact of the vulnerability
- Evaluate various security scanners/tools and see which tool does what
- Learn to distinguish between a false positive and a real vulnerability
Description
In this course, you’ll learn how to communicate with relational databases through SQL. how to manipulate data and build queries that communicate with more than one table.
WHY LEARN SQL?
people search through data to find insights to inform strategy, marketing, operations, and a plethora of other categories.
There are a ton of businesses that use large, relational databases, which makes a basic understanding of SQL a great employable skill not only for data scientists, but for almost everyone.
Introduction to SQl Injection
2
Installing WAMP
3
Installing XAMPP
4
Creating Database
5
Drop Database
6
SQL Create Table
7
Rename Table
8
Update Command
9
Where Clause
10
Alias Name
11
SQL Aggregate Function Min, Max,Count,Avg,Sum
SQL Introduction Injection
1
Introduction
2
Testing by Inference
Testing For SQL Injection
1
Checking Vulnerable Websites
2
Manipulating Parameters
3
Terminating SQL Injections
4
Automating SQL Injection Exploitation
5
Inline SQL Injection Practice
Blind SQL Injection exploitation
1
Blind SQL Fingerprint Practice
2
Boolean Blind SQL Injection Exploiting
3
Time-Based Techniques
Exploiting SQL Injection
1
Non blind Fingerprint
2
SQL Injection Ajax
3
Burp Suite Intercepting a post request
4
Extracting Data Through Union Statement
5
Extracting Data Through Union Statements 1
6
Extracting Data Through Union statements 2
7
Extracting Data Through Union statements 3
8
Extracting Data Through Union statements 4
9
SQL Remote Code Execution
10
Making Your User into an Admin source code
SQL Injection Prevention
1
SQL Prevention
2
SQL Injection Insertion demo
3
Code Review for SQL Injection PHP Code
4
Prevent SQL injection in PHP Insertion
5
Delete SQL Injection
6
Prevent SQL Injection in PHP Delete
7
Prepare SQL Injection on Update
8
SQL Injection on Update
9
Prevent SQL injection in PHP Select
SQL Injection scanning and Exploitation Tools
1
JSQL Injection Tool
2
JSQL Demo
Code Level Defenses and Advanced Topics
1
Extracting MySQL Server Configuration and Information
2
Hybrid Attacks on SQL Injection with XSS
3
Handling Sensitive Data
4
Variations on a Theme
5
Encoding Output
6
Attacking the Database Server
7
Anatomy of an SQl Injection Attack
8
Extracting MySQL Server Configuration Information
SQL Injection Bug Reports
1
SQL Injection Report
2
SQL Injection on Uber Report