Companies Home Search Profile

Ethical Hacking: SQL Injection

Focused View

Malcolm Shore

1:39:34

310 View
  • 01 - Understanding how SQL injections work.mp4
    00:46
  • 02 - What you should know.mp4
    00:40
  • 03 - Disclaimer.mp4
    01:12
  • 01 - Starting with SQL.mp4
    05:10
  • 02 - Creating a MySQL database.mp4
    04:39
  • 03 - Using SQL.mp4
    05:27
  • 04 - Finding the SQL password.mp4
    02:01
  • 01 - Checking out the Security Shepherd.mp4
    05:30
  • 02 - Injecting Mutillidae.mp4
    11:05
  • 03 - Deep diving the target with SQLi.mp4
    03:26
  • 04 - Cracking the MySQL hash.mp4
    02:17
  • 05 - Injecting Microsoft SQL Server.mp4
    07:35
  • 06 - Injecting Oracle SQL Server.mp4
    04:59
  • 01 - Inferring TRUE when blind.mp4
    02:47
  • 02 - Getting our first sqlmap injection.mp4
    05:35
  • 03 - Inserting an SQL injection via Burp Suite.mp4
    01:05
  • 04 - Following up with a second injection.mp4
    06:31
  • 05 - Defeating the WAF.mp4
    05:00
  • 06 - Navigating a complex injection.mp4
    11:21
  • 07 - Using request messages to inject SQL.mp4
    05:24
  • 08 - Checking out SQLI Labs.mp4
    05:53
  • 01 - What's next.mp4
    01:11
  • Ex_Files_Ethical_Hacking_SQL_Injection.zip
  • Description


    SQL injections are a common way to gain unauthorized access to web applications and extract data from them. In this course, instructor Malcolm Shore shows you the SQL command language and how it is used by attackers to craft SQL Injections. Malcolm begins with commonly encountered relational databases and the basics of the SQL command language. Then he focuses on advanced SQL commands that may be used by attackers to achieve SQL injections. Malcolm explains how to use a simple Python script and how an SQL injection changes the backend SQL query. Then he demonstrates how SQL injections could be used to exploit some testing targets. Malcolm steps through the process of automating SQL injection exploits, then finishes with advice on how to continue to hone your skills as a penetration tester.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Malcolm Shore
    Malcolm Shore
    Instructor's Courses
    Wide range of IT experience ranging from systems programming to policy and strategic planning. Strong expertise in applied IT security, focused on policy and governance. Teaching post graduate security (forensics, information warfare, security management, applied cryptography) Past interests include virtual worlds and web3d developments. Current work focusing on Cloud, security architectures, and national-level cybersecurity Specialties: SABSA, Cloud, Cryptography, Cybersecurity Strategy, Network Survivability
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 22
    • duration 1:39:34
    • Release Date 2023/01/18