The Significance of SQL Injection
Executing a SQL Injection Attack
The Impact of a Successful Attack
SQL Injection in the Wild
Summary
Overview
Understanding Structured Query Language
Statement Termination
Using the SQL Comment Syntax
SQL Queries Versus Data
The Value of Internal Exceptions
Summary
Overview
Types of SQL Injection
The Single Character Injection Test
Modifying the Query Structure
Circumventing Website Logins
Modifying Data and Database Objects
Identifying the Risk in Code
Understanding and Detecting Input Sanitization
Summary
Overview
Understanding the Union Operator
Executing Union Injection
Manual Database Structure Discovery with Error-based Injection
Querying System Objects for Schema Discovery
Extracting Schema Details with Union Injection
Enumerating Result Sets with Sub-queries
Extracting Schema Details with Error-based Injection
Summary
Overview
Basic and Blind Attack Success Criteria
Understanding a Blind Attack
Applying Boolean Based Injection
Constructing Yes and No Questions for Boolean Based Injection
Enumerating via ASCII Values
Where Time Based Injection Makes Sense
Understanding the WAITFOR DELAY Command
Constructing a Time Based Attack
Summary
Overview
Database Server Feature Comparison
Establishing Account Identity and Rights
Enumerating Other Databases on the System
Creating Database Logins
Extracting Passwords from SQL Server Hashes
Replicating a Table Using OPENROWSET
Executing Commands on the Operating System
SQL Injection for Network Reconnaissance
Summary
Overview
Implement Proper Error Handling
Validating Untrusted Data
Query Parameterization
Stored Procedures
Object Relational Mappers
The Principle of Least Privilege
Isolating the Database Network Segment
Using an IDS or WAF
Keeping Software Patched and Current
Summary
Overview
Understanding Signatures
Basic Evasion Techniques
Encoding for Evasion
Splitting Strings
White Space Diversity
Inline Comments
Variables
String Manipulation
Summary
Overview
Testing in the Browser with SQL Inject Me
Fuzz Testing with Burp Suite
Data Extraction with Havij
Schema Mapping with sqlmap
Dynamic Analysis Testing with NetSparker
Summary
Certification
You will get a certificate on completing this course.
University
This course is not affiliated with any university.
Price
This course costs very less.
Edvicer's Rewards
You can get a cashback of ₹ 100 on buying this course.
Limited Time Discount Offers
Save your money with Edvicer. Check out our premium courses with discount offers.
Save your money with Edvicer. Check out our premium courses with discount offers.
Map your Career
Not sure which job profiles this course will open for you? Check out our AI based tool to get a complete personalized career map.
Not sure which job profiles this course will open for you? Check out our AI based tool to get a complete personalized career map.
Certification
You will get a certificate on completing this course.
University
This course is not affiliated with any university.
Price
This course costs very less.
Edvicer's Rewards
You can get a cashback of ₹ 100 on buying this course.
Pluralsight is not an official partner or accredited training center ofEC-Council. This course goes through how to detect SQL injection and identify risks as you to become an ethical hacker with a strong SQL injection understanding.
Overview
The Significance of SQL Injection
Executing a SQL Injection Attack
The Impact of a Successful Attack
SQL Injection in the Wild
Summary
Overview
Understanding Structured Query Language
Statement Termination
Using the SQL Comment Syntax
SQL Queries Versus Data
The Value of Internal Exceptions
Summary
Overview
Types of SQL Injection
The Single Character Injection Test
Modifying the Query Structure
Circumventing Website Logins
Modifying Data and Database Objects
Identifying the Risk in Code
Understanding and Detecting Input Sanitization
Summary
Overview
Understanding the Union Operator
Executing Union Injection
Manual Database Structure Discovery with Error-based Injection
Querying System Objects for Schema Discovery
Extracting Schema Details with Union Injection
Enumerating Result Sets with Sub-queries
Extracting Schema Details with Error-based Injection
Summary
Overview
Basic and Blind Attack Success Criteria
Understanding a Blind Attack
Applying Boolean Based Injection
Constructing Yes and No Questions for Boolean Based Injection
Enumerating via ASCII Values
Where Time Based Injection Makes Sense
Understanding the WAITFOR DELAY Command
Constructing a Time Based Attack
Summary
Overview
Database Server Feature Comparison
Establishing Account Identity and Rights
Enumerating Other Databases on the System
Creating Database Logins
Extracting Passwords from SQL Server Hashes
Replicating a Table Using OPENROWSET
Executing Commands on the Operating System
SQL Injection for Network Reconnaissance
Summary
Overview
Implement Proper Error Handling
Validating Untrusted Data
Query Parameterization
Stored Procedures
Object Relational Mappers
The Principle of Least Privilege
Isolating the Database Network Segment
Using an IDS or WAF
Keeping Software Patched and Current
Summary
Overview
Understanding Signatures
Basic Evasion Techniques
Encoding for Evasion
Splitting Strings
White Space Diversity
Inline Comments
Variables
String Manipulation
Summary
Overview
Testing in the Browser with SQL Inject Me
Fuzz Testing with Burp Suite
Data Extraction with Havij
Schema Mapping with sqlmap
Dynamic Analysis Testing with NetSparker
Summary
What is SQL?
Structured Query Language (SQL) is a domain-specific language designed for data management for RDBMS. SQL comes particularly handy in managing structured data and offers certain advantages, such as allowing the access of multiple records through a single command and eliminating the need to specify how to access a record. In simpler words, SQL provides tools to the programmer to define, control and manipulate data in a relational model including tables, rows, and columns.
What are the Prerequisites for learning SQL?
If you wish to learn SQL programming, know the prerequisites well for a smooth learning journey. SQL is a basic query language used primarily for databases, coming with no prerequisites as such. With a simple syntax, there aren't many specific requirements, but it would be helpful to learn database concepts, calculus theories, and basic RDBMS concepts. Once you get a hold of these concepts, you are good to go.
Why should you learn SQL?
SQL query is purely a text message application which can help you access data. SQL is used for most relational storage systems, and it is more of a query language than a programming language. Learning SQL helps the programmers in accessing data with greater efficiency through basic queries. It is predominantly effectual for data manipulation, and the data stored in SQL is dynamic, which means it can be manipulated and modified at any point of time using a set of basic queries. These features make SQL fully equipped to manage datasets of all shapes and sizes.
How can Edvicer help you find the best SQL courses?
Edvicer is a great place to learn SQL with a large number of SQL courses, both free and paid, and projects, both for practice and freelancing. Edvicer has helped a large number of people learn SQL online through the best courses from the top providers like Coursera, Udemy, Udacity, and Pluralsight.
What are the top jobs that I can get from learning SQL?
The top job profile for SQL experts are Dotnet Developer with an average salary of INR 5 LPA, Software Engineer with an average salary of INR 7 LPA, and Database Administrator with an average salary of INR 7 LPA. Get your career map for your skills here.
What can I learn after learning SQL?
After learning SQL, the top skills you can learn to open highest number of job profiles for you are Python, Java, and Data Analytics. The top skills that can get you jobs with highest salaries are Node.js, Data Mining, and Statistical Modeling
Write your review of Ethical Hacking: SQL Injection
![]() | ![]() | ![]() |
![]() | ![]() | ![]() |
![]() | ![]() | ![]() |