SQL Injections Unlocked - SQLi Web Attacks
If you want to Master Web Hacking, The fastest way to become an expert would be to study each vulnerability in deep. SQL injection is one of the top 10 vulnerabilities in the world and hence it can be a great start for you to walk on that path.
More
SQL Injection is a type of injection attack that makes it possible to execute malicious SQL statements.
Exploiting this vulnerability can result in adding, modification, or even deletion of the records in the target's database.
FUN FACT - A very large number of websites (about 8% literally) are still vulnerable to SQLi Vulnerability!
How can this course help?
Goes beyond Automations where you learn the actual Reasoning & Logic behind the Attacks.
Detect and Escape those Security controls or Restrictions which even Automated tools can not Detect most of the times.
Essentially, this would be the Last course of SQL Injections that you would ever need for your whole life.
Expect Frequent & Regular Updates whenever needed on the course with New Latest contents & Restrictions Bypassed.
Watch Online SQL Injections Unlocked - SQLi Web Attacks
# | Title | Duration |
---|---|---|
1 | Introduction to the Course | 02:31 |
2 | What are SQL Injections | 12:34 |
3 | Setting up our Practice Lab | 03:03 |
4 | SQL Language Basics | 09:06 |
5 | Types of SQL Injections | 21:10 |
6 | Classic Injection Bypass | 12:57 |
7 | Union Based SQL Injection | 13:08 |
8 | Error Based SQL Injection | 14:19 |
9 | Boolean Based SQL Injection | 17:03 |
10 | Time Based SQL Injection | 10:57 |
11 | Semi-Automated SQL Injection Tools | 15:59 |
12 | Fully-Automated SQL Injection Tools | 16:28 |
13 | Defending against SQL Injections | 09:04 |
14 | How to Install Labs in a Linux OS? (Silent Tutorial) | 03:59 |
15 | LAB 1 - Bypass Usual Login Screen with No Security Controls | 17:33 |
16 | LAB 2 - Bypass Login Screen when Brackets are used in its SQL Statement | 05:55 |
17 | LAB 3- Bypass Client Side Restrictions such as Max Length Limitations | 07:57 |
18 | LAB 4 - Bypass login screen when apostrophes are doubled | 05:53 |
19 | LAB 5 - Bypass application when Apostrophe Deletion is applied | 06:55 |
20 | LAB 6 - Bypass App when No. of Rows Returned is checked | 08:18 |
21 | LAB 7 - Bypass App when Returning Rows Number is checked (SQL Side) | 10:33 |
22 | LAB 8 - What to do when Whitespaces are disabled on Server Side | 03:56 |
23 | LAB 9 - How to Bypass Login Screen if the Field is numeric | 05:26 |
24 | LAB 10 - Bypass Log-Screen with regexp based Number testing | 02:53 |
25 | LAB 11 - Bypass Log-Screen with other regexp based Number tests | 03:05 |
26 | LAB 12 - When Multiline is Used in SQL Syntax of Target | 09:14 |
27 | Metadata Extraction Techniques with SQL Injection | 23:44 |
28 | A Great Way to Speed up Hit and Trial Attempts | 11:25 |
29 | Using ASCII characters in SQLI Payload | 14:04 |