Book Image

How Hackers Find SQL Injections in Minutes with Sqlmap [Video]

By : Dawid Czagan
Book Image

How Hackers Find SQL Injections in Minutes with Sqlmap [Video]

By: Dawid Czagan

Overview of this book

<p>Automated SQL injection detection and exploitation has never been easier! This course shows you how ethical hackers and professional penetration testers find SQL injections speedily with Sqlmap and teaches you how you can do the same to protect your web applications. The course starts with the basics of Sqlmap and then shows you how to use it to dump database table entries. As you progress, you’ll find out how to install a backdoor with Sqlmap and go from SQL injection to remote code execution. You’ll also understand how this tool can be leveraged to maximize the power of SQL injection detection. Finally, you’ll explore how to use tamper scripts in Sqlmap to bypass Web Application Firewalls (WAFs). By the end of this course, you’ll have learned how to detect and exploit SQL injection vulnerabilities automatically using Sqlmap.</p>
Table of Contents (7 chapters)
Free Chapter
1
Introduction
2
The Basics of Sqlmap
3
Dumping Database Table Entries
4
From SQL Injection to Remote Code Execution
5
More Advanced Testing with Sqlmap
6
Bypassing Web Application Firewalls
7
Summary
Chapter 5
More Advanced Testing with Sqlmap
Content Locked
Section 2
Demo
This video demonstrates how Sqlmap can be leveraged to maximize the power of SQL injection detection.