Description
In this course, you will learn :
- Installation of Penetration Testing Labs in Virtual Machines.
- SQL Injection Vulnerability Detection.
- How to Use Browsers to Exploit SQL Injection
- Uploading Shell and Getting Around Restrictions
- Working with the CMD Shell and Executing Commands
Syllabus :
1. Setting Up A Virtual Hacking Lab
- Introduction to virtual machines
- Introduction to Vulnhub Website
- Installing SQL injection to shell Vulnerable machine
- Network Adapter Troubleshooting
2. SQL Injection Workshops
- Information Gathering Via Crawling web applications
- How To Detect SQLi Vulnerability
- How To Break And Fix the query
- Finding Number of Columns Using Order By
- Finding Databases And Tables
- Finding Columns And Dumping the data
3. How To Upload Shells And Bypass Upload Restrictions
-
How to Upload And Work With Shells