Companies Home Search Profile

SQL Injections Unlocked - SQLi Web Attacks

Focused View

Avinash Yadav

4:58:40

21 View
  • 1. Introduction to the Course.mp4
    02:30
  • 2. What are SQL Injections.mp4
    12:33
  • 3. Setting up our Practice Lab.mp4
    03:02
  • 5. SQL Language Basics.mp4
    09:05
  • 6. Types of SQL Injections.mp4
    21:09
  • 7. Classic Injection Bypass.mp4
    12:56
  • 8. Union Based SQL Injection.mp4
    13:07
  • 9. Error Based SQL Injection.mp4
    14:18
  • 10. Boolean Based SQL Injection.mp4
    17:02
  • 11. Time Based SQL Injection.mp4
    10:56
  • 13. Semi-Automated SQL Injection Tools.mp4
    15:58
  • 14. Fully-Automated SQL Injection Tools.mp4
    16:27
  • 15. Defending against SQL Injections.mp4
    09:03
  • 17. How to Install Labs in a Linux OS (Silent Tutorial).mp4
    03:58
  • 18. LAB 1 - Bypass Usual Login Screen with No Security Controls.mp4
    17:32
  • 19. LAB 2 - Bypass Login Screen when Brackets are used in its SQL Statement.mp4
    05:54
  • 20. LAB 3- Bypass Client Side Restrictions such as Max Length Limitations.mp4
    07:56
  • 21. LAB 4 - Bypass login screen when apostrophes are doubled.mp4
    05:52
  • 22. LAB 5 - Bypass application when Apostrophe Deletion is applied.mp4
    06:54
  • 23. LAB 6 - Bypass App when No. of Rows Returned is checked.mp4
    08:17
  • 24. LAB 7 - Bypass App when Returning Rows Number is checked (SQL Side).mp4
    10:32
  • 25. LAB 8 - What to do when Whitespaces are disabled on Server Side.mp4
    03:55
  • 26. LAB 9 - How to Bypass Login Screen if the Field is numeric.mp4
    05:25
  • 27. LAB 10 - Bypass Log-Screen with regexp based Number testing.mp4
    02:52
  • 28. LAB 11 - Bypass Log-Screen with other regexp based Number tests.mp4
    03:04
  • 29. LAB 12 - When Multiline is Used in SQL Syntax of Target.mp4
    09:13
  • 30. Metadata Extraction Techniques with SQL Injection.mp4
    23:43
  • 31. A Great Way to Speed up Hit and Trial Attempts.mp4
    11:24
  • 32. Using ASCII characters in SQLI Payload.mp4
    14:03
  • Description


    Whether Inband or Inferential / Manual or Automated , Be able to perform all types of SQL Injection Attacks Successfully

    What You'll Learn?


    • SQL Language Basics
    • Defense for SQLi Attacks
    • Union Based SQL Injection
    • Error Based SQL Injection
    • Boolean Based SQL Injection
    • Time Based SQL Injection
    • Semi-Automated SQLi Tools
    • Automated SQL Injections

    Who is this for?


  • Definitely and by no-doubt, this course is for You
  • Aspiring Web Hackers willing to learn specifically about SQLIs
  • Bug Hunting Experts willing to Sharpen their SQL Injection skills.
  • What You Need to Know?


  • Device with Windows/Mac/Linux
  • Understand the Basic Web Terminologies
  • More details


    Description

    "Knowledge is Power" Right? Actually Wrong.
    In fact "The Ability to apply that Knowledge is Power!".


    If you want to Master Web Hacking, The fastest way to become an expert would be to study each vulnerability in deep. SQL injection is one of the top 10 vulnerabilities in the world and hence it can be a great start for you to walk on that path. 

    1. SQL Injection is a type of injection attack that makes it possible to execute malicious SQL statements.

    2. Exploiting this vulnerability can result in adding, modification, or even deletion of the records in the target's database.

    3. FUN FACT - A very large number of websites (about 8% literally) are still vulnerable to SQLi Vulnerability!


    How can this course help?

    • Goes beyond Automations where you learn the actual Reasoning & Logic behind the Attacks.

    • Detect and Escape those Security controls or Restrictions which even Automated tools can not Detect most of the times.

    • Essentially, this would be the Last course of SQL Injections that you would ever need for your whole life.

    • Expect Frequent & Regular Updates whenever needed on the course with New Latest contents & Restrictions Bypassed.

    Who this course is for:

    • Definitely and by no-doubt, this course is for You
    • Aspiring Web Hackers willing to learn specifically about SQLIs
    • Bug Hunting Experts willing to Sharpen their SQL Injection skills.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Avinash Yadav
    Avinash Yadav
    Instructor's Courses
    Avinash Yadav is a young Information Security Expert with a special focus on cybersecurity management as well as double-blind penetration testing.In his learning phase, he had struggled a lot due to lack of thoughtfully curated sources of information to learn such an important skill. When he started to work on real projects, he could hardly find anything useful from what was taught in the traditional online cybersecurity schools.Finally, after getting proper guidance and direction from some adept professionals coupled with observations from his own failures, experiences and constant experiments, he learned some really sought-after skills that helped him develop his expertise in Cybersecurity.He brings his experience on the table through the medium of his passion for teaching. He has authored a couple of online courses with well curated concepts and practicals on Penetration testing and Information Security that the students can pursue to build up skills that are actually needed to be able to work in the Cybersecurity domain rather than just focussing on random sources of information.Here on Udemy, He looks forward to helping aspiring students on their journey to explore penetration testing, ethical hacking, and information security in order to become the person they would want to be, in an arguably short period of time!
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 29
    • duration 4:58:40
    • Release Date 2024/03/13

    Courses related to MySQL

    Subtitle
    Create a blog using php mysql and javascript
    Subtitle
    MySQL Essential Training
    Linkedin Learning Bill Weinman
    Bill Weinman
    MySQL Essential Training
    1:58:35
    English subtitles
    05/08/2024

    Courses related to Ethical Hacking

    Courses related to Penetration Testing