YoVDO

Ethical Hacking: SQL Injection

Offered By: LinkedIn Learning

Tags

SQL Injection Courses Cybersecurity Courses Ethical Hacking Courses Web Application Firewalls Courses

Course Description

Overview

Learn about the SQL command language and SQL injections. Examine SQL injections in MySQL, SQL Server, and Oracle XE, and discover how attackers defeat web application firewalls.

Syllabus

Introduction
  • Understanding how SQL injections work
  • What you should know
  • Disclaimer
1. SQL Basics
  • Starting with SQL
  • Creating a MySQL database
  • Using SQL
  • Finding the SQL password
2. Testing for SQL Injections
  • Checking out the Security Shepherd
  • Injecting Mutillidae
  • Deep diving the target with SQLi
  • Cracking the MySQL hash
  • Injecting Microsoft SQL Server
  • Injecting Oracle SQL Server
3. Automating SQL Injection Exploits
  • Inferring TRUE when blind
  • Using prepared SQL queries
  • Getting our first sqlmap injection
  • Sanitizing input to SQL
  • Inserting an SQL injection via Burp Suite
  • Following up with a second injection
  • Defeating the WAF
  • Navigating a complex injection
  • Using request messages to inject SQL
  • Checking out SQLI Labs
Conclusion
  • What's next?

Taught by

Malcolm Shore

Related Courses

Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax
MSc Cyber Security
Coventry University via FutureLearn
Network Security - Introduction to Network Security
New York University (NYU) via edX
Network Security - Advanced Topics
New York University (NYU) via edX