CEH v11: SQL Injection & SQLMap
Ethical Hacker v11
- 2 Videos | 42m 10s
- Includes Assessment
- Earns a Badge
SQL injection is typically used to access sensitive information from a target's database, but under the right circumstances, it can be used to access the remote file system or even allow for remote system shell access. In this course, you'll learn the SQLi techniques used to read and write to files on the target system, as well as gain interactive shell access. Manual SQL injection testing is a necessary skill, but often time to test is limited and it's useful to have a tool like SQLMap. You'll finish this course by learning how to use SQLMap to automate the process of testing SQL injections. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.
WHAT YOU WILL LEARN
describe the SQL Injection techniques used to write a file on a target systemidentify the SQL statements that can be used to write files to a target system using SQLi and that could allow an attacker to gain interactive shell accessrecognize the limitations of using SQLi techniques to read a fileuse SQLi techniques to read a file on a target system
describe the sqlmap requirements in order to automate SQL injectionsidentify sqlmap options to enumerate data from SQL Injectionsrecognize how to use sqlmap to automate detection and enumeration of SQL injections
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.