CEH v11: SQL Injection & SQLMap

Ethical Hacker v11
  • 2 Videos | 42m 10s
  • Includes Assessment
  • Earns a Badge
SQL injection is typically used to access sensitive information from a target's database, but under the right circumstances, it can be used to access the remote file system or even allow for remote system shell access. In this course, you'll learn the SQLi techniques used to read and write to files on the target system, as well as gain interactive shell access. Manual SQL injection testing is a necessary skill, but often time to test is limited and it's useful to have a tool like SQLMap. You'll finish this course by learning how to use SQLMap to automate the process of testing SQL injections. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.

WHAT YOU WILL LEARN

  • describe the SQL Injection techniques used to write a file on a target system
    identify the SQL statements that can be used to write files to a target system using SQLi and that could allow an attacker to gain interactive shell access
    recognize the limitations of using SQLi techniques to read a file
    use SQLi techniques to read a file on a target system
  • describe the sqlmap requirements in order to automate SQL injections
    identify sqlmap options to enumerate data from SQL Injections
    recognize how to use sqlmap to automate detection and enumeration of SQL injections

IN THIS COURSE

  • Locked
    1. 
    System Access with SQL Injection
    23m 29s
  • Locked
    2. 
    SQL Injection Testing with SQLMap
    18m 42s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.