CEH v12: SQL Injection and SQLMap

CEH v12    |    Intermediate
  • 2 videos | 46m 48s
  • Includes Assessment
  • Earns a Badge
SQL injection (SQLi) is typically used to access sensitive information from a target's database, but under the right circumstances, it can be used to access the remote file system or even allow for remote system shell access. In this course, you'll learn the SQLi techniques used to read and write to files on the target system, as well as gain interactive shell access. Manual SQL injection testing is a necessary skill, but often time to test is limited and it's useful to have a tool like SQLMap. You'll finish this course by learning how to use SQLMap to automate the process of testing SQL injections. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.

WHAT YOU WILL LEARN

  • Use sqli techniques to read a file on a target system
    recognize the limitations of using sqli techniques to read a file
    describe the sql injection techniques used to write a file on a target system
    identify the sql statements that can be used to write files to a target system using sqli and that could allow an attacker to gain interactive shell access
  • Recognize how to use sqlmap to automate detection and enumeration of sql injections
    describe the sqlmap requirements in order to automate sql injections
    identify sqlmap options to enumerate data from sql injections

IN THIS COURSE

  • Locked
    1.  System Access with SQL Injection (SQLi)
    24m 57s
    Upon completion of this video, you will be able to recognize SQLi techniques that can be used to read and write to files on the target system and gain interactive shell access. FREE ACCESS
  • Locked
    2.  SQL Injection Testing with SQLMap
    21m 52s
    After completing this video, you will be able to recognize how to use SQLMap to automate the process of testing SQL injections. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 344 users Rating 4.6 of 344 users (344)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 1.0 of 1 users Rating 1.0 of 1 users (1)