2.4 - SQL Injection
SQL Injection
Topics
Introduction to SQL Injection
Finding SQL Injection
Exploiting In-Band SQL Injection
Exploiting Error-Based SQL Injection
Exploiting Blind SQL Injection
SQLMap
Mitigation Strategies
From SQLi to Server Takeover
Web Basics
βWeb Application Basicsβ
Practise
π¬ There are many vulnerable testing web apps like:
βDVWA - Kali Installβ
βbWAPPβ
DVWA - My Writeups
DVWATheory and Lab platform
β Disclaimer
Never use tools and techniques on real IP addresses, hosts or networks without proper authorization!
