Initial Access with sqlmap
sqlmap is a powerful automation tool for identifying and exploiting SQL injection flaws. Add another tool to your toolbox by using sqlmap to exfiltrate data and gain initial access.
SQL injection flaws are one of the most critical application vulnerabilities. They can affect any application that uses a database, and a single flaw can lead to data loss or even server compromise. In this course, Initial Access with sqlmap, you’ll learn how to use this powerful tool to identify and exploit a variety of SQL injection flaws in a red team environment. First, you’ll discover how to setup sqlmap’s command line and test authenticated web pages. Next, you’ll use sqlmap’s built-in enumeration tools to exfiltrate user data. Then, you’ll delve into tuning sqlmap’s parameters when crawling applications. Finally, you’ll exploit a SQL injection to gain initial system access. When you’re finished with this course, you’ll have the skills and knowledge of sqlmap needed to streamline the process of finding and exploiting SQL injection flaws.
Author Name: Casey Dunham
Author Description:
Casey Dunham is an independent security researcher and consultant specializing in application security. His passion for software development began at the impressionable age of 8, when he taught himself Atari Basic – setting the stage for his career ever since. After being exposed to the 2600 community in middle-school and later on attending DEF CON for the first time, Casey switched from building to breaking software. Currently, his primary focus is helping clients build resilient and secure app… more
Table of Contents
- Course Overview
1min - Exploiting SQL Injections with sqlmap
20mins - Resources
1min
There are no reviews yet.