Companies Home Search Profile

Mastering SQL Injection - The Ultimate Hands-On Course

Focused View

Experts with David Bombal,David Bombal,Rana Khalil

9:41:45

94 View
  • 1. Course Introduction.mp4
    02:19
  • 1. Udemy tips and tricks.mp4
    03:20
  • 2.1 David Bombals Discord Server.html
  • 2. Answering your questions.mp4
    01:54
  • 1.1 SQL Injection Complete Guide Slides.pdf
  • 1. Agenda.mp4
    01:28
  • 2. What is SQL Injection.mp4
    29:42
  • 3. How Do You Find SQL Injection Vulnerabilities.mp4
    12:09
  • 4. How Do You Exploit SQL Injection Vulnerabilities.mp4
    12:38
  • 5. How Do You Prevent SQL Injection Vulnerabilities.mp4
    08:55
  • 6.1 OWASP SQL Injection.html
  • 6.2 OWASP SQL Prevention Cheat Sheet.html
  • 6.3 PentestMonkey SQL Injection.html
  • 6.4 Web Security Academy - SQL Injection.html
  • 6. Additional Resources.mp4
    00:42
  • 1.1 Lab-Setup.pdf
  • 1. Lab Environment Setup.mp4
    07:21
  • 1.1 Notes.txt document.html
  • 1.2 Python script.html
  • 1.3 Ranas Twitter account.html
  • 1.4 Web Security Academy Lab Exercise.html
  • 1. Lab #1 SQL injection vulnerability in WHERE clause allowing retrieval of hidden.mp4
    28:33
  • 2.1 Notes.txt document.html
  • 2.2 Python script.html
  • 2.3 Ranas Twitter account.html
  • 2.4 Web Security Academy Lab Exercise.html
  • 2. Lab #2 SQL injection vulnerability allowing login bypass.mp4
    33:12
  • 3.1 Notes.txt document.html
  • 3.2 Python script.html
  • 3.3 Ranas Twitter account.html
  • 3.4 Web Security Academy Lab Exercise.html
  • 3. Lab #3 SQLi UNION attack determining the number of columns returned by the query.mp4
    33:54
  • 4.1 Notes.txt document.html
  • 4.2 Python script.html
  • 4.3 Ranas Twitter account.html
  • 4.4 Web Security Academy Lab Exercise.html
  • 4. Lab #4 SQL injection UNION attack, finding a column containing text.mp4
    29:03
  • 5.1 Notes.txt document.html
  • 5.2 Python script.html
  • 5.3 Ranas Twitter account.html
  • 5.4 Web Security Academy Lab Exercise.html
  • 5. Lab #5 SQL injection UNION attack, retrieving data from other tables.mp4
    24:40
  • 6.1 Notes.txt document.html
  • 6.2 Python script.html
  • 6.3 Ranas Twitter account.html
  • 6.4 Web Security Academy Lab Exercise.html
  • 6. Lab #6 SQL injection UNION attack, retrieving multiple values in a single column.mp4
    29:18
  • 7.1 Notes.txt document.html
  • 7.2 Python script.html
  • 7.3 Ranas Twitter account.html
  • 7.4 Web Security Academy Lab Exercises.html
  • 7. Lab #7 SQL injection attack, querying the database type and version on Oracle.mp4
    26:44
  • 8.1 Notes.txt document.html
  • 8.2 Python script.html
  • 8.3 Ranas Twitter account.html
  • 8.4 Web Security Academy Lab Exercise.html
  • 8. Lab #8 SQLi attack, querying the database type and version on MySQL And Microsoft.mp4
    22:10
  • 9.1 Notes.txt document.html
  • 9.2 Python script.html
  • 9.3 Ranas Twitter account.html
  • 9.4 Web Security Academy Lab Exercise.html
  • 9. Lab #9 SQL injection attack, listing the database contents on non Oracle databas.mp4
    45:12
  • 10.1 Notes.txt document.html
  • 10.2 Python script.html
  • 10.3 Ranas Twitter account.html
  • 10.4 Web Security Academy Lab Exercise.html
  • 10. Lab #10 SQL injection attack, listing the database contents on Oracle.mp4
    40:19
  • 11.1 Notes.txt document.html
  • 11.2 Python script.html
  • 11.3 Ranas Twitter account.html
  • 11.4 Web Security Academy Lab Exercise.html
  • 11. Lab #11 Blind SQL injection with conditional responses.mp4
    48:33
  • 12.1 Notes.txt document.html
  • 12.2 Python script.html
  • 12.3 Ranas Twitter account.html
  • 12.4 Web Security Academy Lab Exercise.html
  • 12. Lab #12 Blind SQL injection with conditional errors.mp4
    44:52
  • 13.1 Notes.txt document.html
  • 13.2 Python script.html
  • 13.3 Ranas Twitter account.html
  • 13.4 Web Security Academy Lab Exercise.html
  • 13. Lab #13 Blind SQL injection with time delays.mp4
    19:02
  • 14.1 Notes.txt document.html
  • 14.2 Python script.html
  • 14.3 Ranas Twitter account.html
  • 14.4 Web Security Academy Lab Exercise.html
  • 14. Lab #14 Blind SQL injection with time delays and information retrieval.mp4
    35:31
  • 15. Note - Changes to Burp Collaborator.html
  • 16.1 Notes.txt document.html
  • 16.2 Ranas Twitter account.html
  • 16.3 Web Security Academy Lab Exercise.html
  • 16. Lab #15 Blind SQL injection with out-of-band interaction.mp4
    10:14
  • 17.1 Notes.txt document.html
  • 17.2 Ranas Twitter account.html
  • 17.3 Web Security Academy Lab Exercise.html
  • 17. Lab #16 Blind SQL injection with out of band data exfiltration.mp4
    08:08
  • 18.1 Notes.txt document.html
  • 18.2 Ranas Twitter account.html
  • 18.3 Web Security Academy Lab Exercise.html
  • 18. Lab #17 SQL injection with filter bypass via XML encoding.mp4
    07:10
  • 19.1 Notes.txt.html
  • 19.2 Ranas Twitter account.html
  • 19.3 Web Security Academy Lab Exercise Link.html
  • 19. Lab #18 Visible error-based SQL injection.mp4
    14:42
  • 1. Bonus Lecture.html
  • Description


    How to Find, Exploit and Defend Against SQL Injection Vulnerabilities. For Ethical Hackers, Developers & Pentesters

    What You'll Learn?


    • Learn how to find SQL Injection vulnerabilities from both a black-box and white-box perspective.
    • Learn how to exploit SQL Injection vulnerabilities of varying difficulty levels.
    • Gain hands-on experience exploiting SQL injection vulnerabilities using Burp Suite Community and Professional editions.
    • Learn how to automate attacks in Python.
    • Learn how to defend against SQL Injection vulnerabilities.

    Who is this for?


  • Penetration testers that want to understand how to find and exploit SQL injection vulnerabilities.
  • Software developers that want to understand how to defend against SQL injection vulnerabilities.
  • Bug bounty hunters that want to understand how to find and exploit SQL injection vulnerabilities.
  • Individuals preparing for the Burp Suite Certified Practitioner (BSCP) exam.
  • Individuals preparing for the OSWE certification.
  • What You Need to Know?


  • Basic knowledge of computers (i.e. how to use the internet).
  • Basic knowledge of web fundamentals (HTTP requests, methods, cookies, status codes, etc.).
  • Basic knowledge of SQL commands and query structure.
  • Latest version of Kali Linux VM (free download).
  • PortSwigger Web Security Academy account to access the labs (free registration).
  • Basic knowledge of Python Scripting.
  • More details


    Description

    For the longest time, up until a few years ago, SQL Injection fell under the number one most critical security risk facing web applications today. Although the vulnerability itself is simple to learn and exploit, it can potentially lead to disastrous consequences that leave an organization open to severe risks such as sensitive information disclosure, authentication bypass and even remote code execution.

    In this course, we dive into the technical details behind SQL Injection vulnerabilities, the different types of SQL injection vulnerabilities, how to find them from both a black-box and a white-box perspective and cover the different ways to exploit SQL injection vulnerabilities. We also go through prevention and mitigation techniques on how to prevent and mitigate these types of vulnerabilities.

    This is not your average course that just teaches you the basics of SQL Injection. This course contains over 9 hours worth of content that not only describes the technical details behind SQL Injection vulnerabilities, but also contains 18 labs that give you hands-on experience exploiting real-world examples. The labs are of varying difficulty levels starting with really simple examples and slowly moving up in difficulty.

    If you're a penetration tester, application security speciality, bug bounty hunter, software developer, ethical hacker, or just anyone interested in web application security, this course is for you!

    Who this course is for:

    • Penetration testers that want to understand how to find and exploit SQL injection vulnerabilities.
    • Software developers that want to understand how to defend against SQL injection vulnerabilities.
    • Bug bounty hunters that want to understand how to find and exploit SQL injection vulnerabilities.
    • Individuals preparing for the Burp Suite Certified Practitioner (BSCP) exam.
    • Individuals preparing for the OSWE certification.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Experts with David Bombal
    Experts with David Bombal
    Instructor's Courses
    David Bombal, together with some of the best minds in the industry is offering courses on a wide range of topics including networking, programming and software development. Our team has decades of experience teaching students from all over the world. Together we can do more!=======================================Chuck Black=======================================Chuck has been developing software for networking equipment since 1981 and has designed and developed software products for large scale networking environments using languages such as C, C++, and Java. Chuck has been granted 15 patents in the areas of network topology discovery, management, monitoring, health, and access control.Chuck graduated from California Polytechnic State University-San Luis Obispo with Bachelor and Master of Computer Science degrees.Chuck has developed Python for Network Engineers courses for vendors such as Cisco and Juniper Networks. In addition, he has developed numerous SDN application development courses for vendors such as Cisco, HPE and Brocade.Chuck is the co-author of the book SDN: A Comprehensive Approach, a thorough technical and business exploration of software defined networking, which has been used as a textbook for graduate level computer science coursework.Chuck is a well known figure in SDN and network programmability circles. He has made participated in organizations such as the Open Networking Foundation (ONF) and the OpenDaylight project.Chuck is the coauthor of one of the most popular SDN books on the market today: Software Defined Networks: A Comprehensive Approach.=======================================Hank Preston=======================================Hank’s two passions are technology and theatre. Bringing them together drives him towards a borderline obsession on creating entertaining presentations, labs and demonstrations that breakdown complex technology topics for audiences. After spending several years working on and behind the scenes on stage productions, what started as a hobby turned to a profession when Hank entered the IT industry with a focus on web and database development and engineering. Drifting from development into infrastructure engineering brought him to Cisco as a Systems Engineer, focusing on Data Center and Cloud Architecture for large enterprise customers. And after six years as an SE, Hank took up the mantle of a Developer Evangelist with DevNet where he can focuses full time on reminding everyone that technology can and should be fun to work with. Hank holds a Master Degree in Information Systems as well as several certifications including CCIE R/S 38336 from Cisco. =======================================David Bombal=======================================David Bombal (CCIE #11023 Emeritus) passed his Cisco Certified Internetwork Expert Routing and Switching exam in January 2003 and is one of a small percentage of Cisco Engineers that pass their CCIE labs on their first attempt. David qualified as a Cisco Certified Systems Instructor (CCSI #22787) many years ago! He has been training Cisco courses for over 15 years and has delivered instructor led courses in various countries around the world covering a wide range of Cisco topics from CCNA to CCIE.He has also personally developed Cisco engineer utilities such as the VPN Config Generator, software, training materials, EBooks, videos and other products which are used throughout the world.David has designed, implemented and managed networks ranging from single sites to those that span 50 countries.
    David Bombal
    David Bombal
    Instructor's Courses
    David Bombal (CCIE  #11023 Emeritus) passed his Cisco Certified Internetwork Expert Routing and Switching exam in January 2003 and is one of a small percentage of Cisco Engineers that pass their CCIE labs on their first attempt.  David qualified as a  Cisco Certified Systems Instructor (CCSI #22787) many years ago! He has been training Cisco  courses for over 15 years and has delivered instructor led courses in various  countries around the world covering a wide range of Cisco topics from CCNA to  CCIE.  David is very active on social media and has over 500,000 YouTube subscribers and has posted over 1,000 free videos.
    Rana is an application security engineer team lead consultant.  She has a diverse professional background with experience in software development, quality assurance and pentesting. She holds a Bachelor and Master’s degree in Mathematics and Computer Science from the University of Ottawa. She has spoken about her research and work at several local and international conferences. In her non-existent free time, you find her posting educational videos and holding workshops through her Academy and YouTube channel.  She has received several awards and honorable mentions for her research and contributions to the cybersecurity community.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 28
    • duration 9:41:45
    • Release Date 2023/08/24