In this course, you will :
- See the power of SQL injections in action.
- You will attack applications in a legal and safe manner.
- Learn how to use defence controls to keep SQL injections out of your applications and databases.
- SQL injections can be done manually or with automated tools.
- Discover various SQL injection techniques.
- Examine vulnerable code and learn how to secure it.
1. Getting Started
- Setting up safe and legal environments to attack
- Getting started with OWASP ZAP
- Reviewing important SQL concepts
2. SQL Injection Attacks
- SQL injections explained
- Cheat sheets and references
- Information gathering
- SQL injection attacks by hand
- Mounting an attack with SQLMap
3. Defenses Against SQL Injections
- Defending the network layer
- Defending the application layer
- Defending the database layer