$199.99
Buy Now
Or preview some of the content.
176 Minutes of Personalized Content
16 Lectures
Assignments
1 Attachments
Certificate of Completion
Lifetime Access to Course & Updates
Satisfaction Guarantee

Training 5+ people?
Contact us for offers and discounts.

Advanced SQL Injection

Advanced web hacking via SQL injection, explained step-by-step by world-class hackers.



5.0
( 4 ratings) 6 students enrolled
Created by ZDResearch Training Last updated 5/2018

Description

ZDResearch Advanced SQL Injection is part of the ZDResearch Advanced Web Hacking curriculum. The curriculum consists of 10 modules, the first of which is Advanced SQL Injection. 

This course will teach you the fundamentals of SQL injection and help you fully comprehend the technique through hours of hands-on labs and real world demos, making you comfortable in pursuing the field on your own. It also enables you to go through the materials provided by the rest of Advanced Web Hacking curriculum.

Advanced SQL Injection covers many aspects of SQL injection, from the benefits of finding them manually versus using automated tools to find and exploit them, to double-blind, error-based and second-order injection attacks. After passing this course, you should be a master in the topic of SQL injections, easily able to find vulnerable applications, exploit them and patch them.

The course is taught by some of the world's best hackers, with real, hands-on hacking experience and not just security training. Our instructors have worked in many of the world's top hacking teams, have received hacking bounties from many well-known companies such as Google and Facebook, and have worked as cyber security consultants in companies such as Google, Facebook and Intel.

Topics

  • SQL Injection Techniques
  • Finding SQL Injection
  • Protecting Against SQL Injection
  • Tautology Injection
  • Union-Based SQL Injection
  • Reading and Writing Files with SQL Injection
  • Blind SQL Injection
  • Double-Blind SQL Injection
  • Error-Based SQL Injection
  • System Takeover via SQL Injection
  • SQL Injection Automated Tools
  • Bypassing Blacklists and Firewalls
  • Order/Limit SQL Injection
  • Second Order SQL Injection

Requirements

  • Web Programming
  • SQL

Target Audience

  • Web Developers
  • Security Engineers
  • Web Application Penetration Testers
  • Hackers
Expand All 16 items02:56:29

Curriculum

1 Introduction
67 1. Lecture 1 - Introduction
69 3. Lecture 3 - Finding SQL Injections Manually
70 4. Lecture 4 - Protection Strategies
71 5. Lecture 5 - DBMS Detection
2 SQL Injection Techniques
72 6. Lecture 1 - Authentication Bypass
73 7. Lecture 2 - Union-Based Injections
74 8. Lecture 3 - Reading and Writing Files
75 9. Lecture 4 - Blind Injections
76 10. Lecture 5 - Double-Blind Injections
77 11. Lecture 6 - Error-Based Injections
3 Advanced SQL Injection
78 12. Lecture 1 - System Takeover
79 13. Lecture 2 - Automated Tools
80 14. Lecture 3 - Bypassing Blacklists
81 15. Lecture 4 - Order By and Limit Injection
82 16. Lecture 5 - Second Order Injections

Reviews

RG
2018-10-16 05:37
Ricamora Giancarlo


Very Professional And know what he's Doing
+ Easy to follow and explained everything in the right way.

Recommended to People who like to learn Web penetration.
JO
2018-02-22 16:24
James O'Neil


Yet another great course from ZDResearch!

I usually purchase ZDResearch courses as soon as they become available, but this one is both high-quality and cheap, so double the pleasure!