
Secure Your Site from SQL Injection Threats
Learn how to protect your site from SQL Injections.
Do you think your site is secure? SQL Injection is one of oldest and most powerful threat to Web applications and there is a good chance if you created an application that uses a database and are not a security pro you probably have some "holes" in your security that if noticed by a hacker can create irreversible damage. 30,000 sites get hacked every single day. Yet a simple to follow step by step guides haven't been available for the common web developer. We are changing that and introducing Hitesh Choudhary a web security expert that toke the time to reveal the most common threats, how to protect against them and how to uncover new threats on your site on your own. He demystifies the common threats and helps you develop a security plan for your site.
This course is a hands on guide to master SQL Injection. In this course you will learn to design your own challenges along with detailed guidance on how to hack into custom created sites for pentesting purposes.
If you are a Pentester or Hacker or Developer or Information Security enthusiastic, you will love this course and if you ever wondered how are the common ways that hackers penetrate into sites this course will shed the light and more.
So, No theories Just practical in-depth lessons to learn. To take full advantage of this course it is ideal that you have a background in programing.
Your Instructor
Course Curriculum
-
Startcourse Introduction (10:05)
-
Start03 Introduction to Instructor (0:59)
-
Start03.5 legal aspects (1:08)
-
Start04 SqL Injection (5:35)
-
Start05 security misconceptions (5:28)
-
Start06 windows setup installation (7:16)
-
Start07 Linux setup installation (7:38)
-
Start08 Error based Basic Injection (10:31)
-
Start09 Moving more into errors (7:54)
-
Start10 Dumping the database for Challenge-solution 1 (9:18)
-
Start11 Dumping via SQL (5:57)
-
Start12 Without quote injection Challenge-solution 2 (10:02)
-
Start13 Injecting with OR and AND (6:41)
-
Start14 injection challenge-solution 3 (5:04)
-
Start15 SQL injection Challenge-solution 4 (4:40)
-
Start16 Important 26 commands for advance SQL Injection (22:21)
-
Start17 double query injection at challenge 5 (8:46)
-
Start18 double query exercise (6:35)
-
Start19 SQL commands for advance injection (7:45)
-
Start20 Blind injection Boolean Type (10:32)
-
Start21 command for time based injection (13:06)
-
Start22 time based Injection Challenge-solution 8 (6:12)
-
Start23 Dumping data injection (5:44)
-
Start24 dumping challenge-solution 9 (8:07)
-
Start25 post injection challenge-solution 10 (9:18)
-
Start26 post injection challenge-solution 11 (5:41)
-
Start27 post injection double query commands (7:47)
-
Start28 double query challenge-solution 12 (5:40)
-
Start29 time based post challenge-solution-13 (6:44)
-
Start30 no HINT challenge 14 (2:32)
-
Start31 stripslashes and update query attack at challenge-solution-15 (11:04)
-
Start32 Header Injecton by tamperdata at challenge-solution-16
-
Start33 cookie based injection at challenge-solution-17 (11:13)
-
Start34 encoded injection via cookie at challenge-solution-18 (11:02)
-
Start35 challenge 19 (1:37)
-
Start36 second order injection with filters challenge-solution-20 (9:11)
-
Start37 Blacklisted OR n AND challenge-solution-21 (6:04)
-
Start38 Blacklisted space n comments challenge-solution-22 (11:12)
-
Start39 analyzing important scripts code to inject (4:01)
-
Start40 practice challenge 23 (1:30)
-
Start41 BlackListed Union and Select at challenge-solution-24 (5:37)
-
Startoutro for SQL Injection Master course (1:13)
-
StartAll source code files