Skip to main content

SQL Injections Unlocked - SQLi Web Attacks

4h 59m 9s
English
Paid

Master Web Hacking: Dive deep into each vulnerability to become an expert. SQL injection ranks among the top 10 vulnerabilities globally, making it a great start for your journey into web security.

Understanding SQL Injection

  1. SQL Injection enables attackers to execute malicious SQL statements.

  2. Exploiting this vulnerability can lead to the addition, modification, or deletion of records in the target's database.

  3. FUN FACT: Approximately 8% of websites remain vulnerable to SQLi vulnerabilities!

Course Benefits

  • Beyond Automations: Learn the reasoning and logic behind attacks, not just automated solutions.

  • Identify and bypass security controls, even those undetectable by automated tools.

  • This is the last SQL Injection course you'll ever need for a lifetime.

  • Frequent Updates: Stay up-to-date with new content and bypassed restrictions.

About the Author: udemy

udemy thumbnail
By connecting students all over the world to the best instructors, Udemy is helping individuals reach their goals and pursue their dreams. Udemy is the leading global marketplace for teaching and learning, connecting millions of students to the skills they need to succeed. Udemy helps organizations of all kinds prepare for the ever-evolving future of work. Our curated collection of top-rated business and technical courses gives companies, governments, and nonprofits the power to develop in-house expertise and satisfy employees’ hunger for learning and development.

Watch Online 29 lessons

This is a demo lesson (10:00 remaining)

You can watch up to 10 minutes for free. Subscribe to unlock all 29 lessons in this course and access 10,000+ hours of premium content across all courses.

View Pricing
0:00
/
#1: Introduction to the Course
All Course Lessons (29)
#Lesson TitleDurationAccess
1
Introduction to the Course Demo
02:31
2
What are SQL Injections
12:34
3
Setting up our Practice Lab
03:03
4
SQL Language Basics
09:06
5
Types of SQL Injections
21:10
6
Classic Injection Bypass
12:57
7
Union Based SQL Injection
13:08
8
Error Based SQL Injection
14:19
9
Boolean Based SQL Injection
17:03
10
Time Based SQL Injection
10:57
11
Semi-Automated SQL Injection Tools
15:59
12
Fully-Automated SQL Injection Tools
16:28
13
Defending against SQL Injections
09:04
14
How to Install Labs in a Linux OS? (Silent Tutorial)
03:59
15
LAB 1 - Bypass Usual Login Screen with No Security Controls
17:33
16
LAB 2 - Bypass Login Screen when Brackets are used in its SQL Statement
05:55
17
LAB 3- Bypass Client Side Restrictions such as Max Length Limitations
07:57
18
LAB 4 - Bypass login screen when apostrophes are doubled
05:53
19
LAB 5 - Bypass application when Apostrophe Deletion is applied
06:55
20
LAB 6 - Bypass App when No. of Rows Returned is checked
08:18
21
LAB 7 - Bypass App when Returning Rows Number is checked (SQL Side)
10:33
22
LAB 8 - What to do when Whitespaces are disabled on Server Side
03:56
23
LAB 9 - How to Bypass Login Screen if the Field is numeric
05:26
24
LAB 10 - Bypass Log-Screen with regexp based Number testing
02:53
25
LAB 11 - Bypass Log-Screen with other regexp based Number tests
03:05
26
LAB 12 - When Multiline is Used in SQL Syntax of Target
09:14
27
Metadata Extraction Techniques with SQL Injection
23:44
28
A Great Way to Speed up Hit and Trial Attempts
11:25
29
Using ASCII characters in SQLI Payload
14:04
Unlock unlimited learning

Get instant access to all 28 lessons in this course, plus thousands of other premium courses. One subscription, unlimited knowledge.

Learn more about subscription