CEH v12: SQL Injection Concepts and Attacks
Many web applications store data in a back-end database and the data is then retrieved as the end user requests it from the front end. This process can allow for end-user injection of SQL queries revealing sensitive data to the unauthorized attacker.
In this course you;ll learn about SQL injection including attack types tools security controls and defense evasion techniques. Next you;ll explore error-based SQLi and how to test for and exploit this common SQLi vulnerability. SQL injections can be used to gain access to sensitive information or even allow access into a remote system but they aren;t always easily executed. To complete this course you;ll learn about blind-based SQLi methods and how to use them to access sensitive information on a remote system.
This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.