• Post category:StudyBullet-15
  • Reading time:6 mins read


How to Find, Exploit and Defend Against SQL Injection Vulnerabilities. For Ethical Hackers, Developers & Pentesters

What you will learn

Learn how to find SQL Injection vulnerabilities from both a black-box and white-box perspective.

Learn how to exploit SQL Injection vulnerabilities of varying difficulty levels.

Gain hands-on experience exploiting SQL injection vulnerabilities using Burp Suite Community and Professional editions.

Learn how to automate attacks in Python.

Learn how to defend against SQL Injection vulnerabilities.

Description

For the longest time, up until a few years ago, SQL Injection fell under the number one most critical security risk facing web applications today. Although the vulnerability itself is simple to learn and exploit, it can potentially lead to disastrous consequences that leave an organization open to severe risks such as sensitive information disclosure, authentication bypass and even remote code execution.

In this course, we dive into the technical details behind SQL Injection vulnerabilities, the different types of SQL injection vulnerabilities, how to find them from both a black-box and a white-box perspective and cover the different ways to exploit SQL injection vulnerabilities. We also go through prevention and mitigation techniques on how to prevent and mitigate these types of vulnerabilities.


Get Instant Notification of New Courses on our Telegram channel.

Noteβž› Make sure your π”ππžπ¦π² cart has only this course you're going to enroll it now, Remove all other courses from the π”ππžπ¦π² cart before Enrolling!


This is not your average course that just teaches you the basics of SQL Injection. This course contains over 9 hours worth of content that not only describes the technical details behind SQL Injection vulnerabilities, but also contains 18 labs that give you hands-on experience exploiting real-world examples. The labs are of varying difficulty levels starting with really simple examples and slowly moving up in difficulty.

If you’re a penetration tester, application security speciality, bug bounty hunter, software developer, ethical hacker, or just anyone interested in web application security, this course is for you!

English
language

Content

Introduction

Course Introduction

Getting help

Udemy tips and tricks
Answering your questions

SQL Injection – Technical Deep Dive

Agenda
What is SQL Injection?
How Do You Find SQL Injection Vulnerabilities?
How Do You Exploit SQL Injection Vulnerabilities?
How Do You Prevent SQL Injection Vulnerabilities?
Additional Resources

Lab Environment Setup

Lab Environment Setup

Hands-on SQL Injection Labs

Lab #1 SQL injection vulnerability in WHERE clause allowing retrieval of hidden
Lab #2 SQL injection vulnerability allowing login bypass
Lab #3 SQLi UNION attack determining the number of columns returned by the query
Lab #4 SQL injection UNION attack, finding a column containing text
Lab #5 SQL injection UNION attack, retrieving data from other tables
Lab #6 SQL injection UNION attack, retrieving multiple values in a single column
Lab #7 SQL injection attack, querying the database type and version on Oracle
Lab #8 SQLi attack, querying the database type and version on MySQL & Microsoft
Lab #9 SQL injection attack, listing the database contents on non Oracle databas
Lab #10 SQL injection attack, listing the database contents on Oracle
Lab #11 Blind SQL injection with conditional responses
Lab #12 Blind SQL injection with conditional errors
Lab #13 Blind SQL injection with time delays
Lab #14 Blind SQL injection with time delays and information retrieval
Note – Changes to Burp Collaborator
Lab #15 Blind SQL injection with out-of-band interaction
Lab #16 Blind SQL injection with out of band data exfiltration
Lab #17 SQL injection with filter bypass via XML encoding
Lab #18 Visible error-based SQL injection

Bonus Lecture

Bonus Lecture