CEH v11: SQL Injection Concepts & Attacks
Many web applications store data in a back-end database and the data is then retrieved as the end user requests it from the front end. This process can allow for end-user injection of SQL queries revealing sensitive data to the unauthorized attacker. In this course youll learn about SQL injection including attack types tools security controls and defense evasion techniques. Next youll explore error-based SQLi and how to test for and exploit this common SQLi vulnerability. SQL injections can be used to gain access to sensitive information or even allow access into a remote system but they arent always easily executed. To complete this course youll learn about blind-based SQLi methods and how to use them to access sensitive information on a remote system. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.