CEH v11: SQL Injection & SQLMap

placeholder

SQL injection is typically used to access sensitive information from a targets database but under the right circumstances it can be used to access the remote file system or even allow for remote system shell access. In this course youll learn the SQLi techniques used to read and write to files on the target system as well as gain interactive shell access. Manual SQL injection testing is a necessary skill but often time to test is limited and useful to have a tool like SQLMap. Youll finish this course by learning how to use SQLMap to automate the process of testing SQL injections. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.