Book Image

How Hackers Find SQL Injections in Minutes with Sqlmap [Video]

By : Dawid Czagan
Book Image

How Hackers Find SQL Injections in Minutes with Sqlmap [Video]

By: Dawid Czagan

Overview of this book

<p>Automated SQL injection detection and exploitation has never been easier! This course shows you how ethical hackers and professional penetration testers find SQL injections speedily with Sqlmap and teaches you how you can do the same to protect your web applications. The course starts with the basics of Sqlmap and then shows you how to use it to dump database table entries. As you progress, you’ll find out how to install a backdoor with Sqlmap and go from SQL injection to remote code execution. You’ll also understand how this tool can be leveraged to maximize the power of SQL injection detection. Finally, you’ll explore how to use tamper scripts in Sqlmap to bypass Web Application Firewalls (WAFs). By the end of this course, you’ll have learned how to detect and exploit SQL injection vulnerabilities automatically using Sqlmap.</p>
Table of Contents (7 chapters)
Free Chapter
1
Introduction
2
The Basics of Sqlmap
3
Dumping Database Table Entries
4
From SQL Injection to Remote Code Execution
5
More Advanced Testing with Sqlmap
6
Bypassing Web Application Firewalls
7
Summary
Chapter 1
Introduction
Content Locked
Section 1
Introduction
This video introduces the course.