skip to content
How hackers find SQL injections in minutes with Sqlmap Preview this item
ClosePreview this item
Checking...

How hackers find SQL injections in minutes with Sqlmap

Author: Dawid Czagan
Publisher: [Place of publication not identified] : [Packt Publishing], [2019]
Edition/Format:   eVideo : Clipart/images/graphics : English
Summary:
"Automated SQL injection detection and exploitation has never been easier! This course will teach you how to find SQL injections in minutes with sqlmap. First, you will learn about the basics of this tool. Then, I will show you how to dump database table entries with sqlmap. After that, you will explore how to install a backdoor with sqlmap and how to go from SQL injection to remote code execution. Then, you will  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Clipart/images/graphics, Internet resource, Videorecording
Document Type: Internet Resource, Computer File, Visual material
All Authors / Contributors: Dawid Czagan
OCLC Number: 1101904218
Notes: Title from title screen (Safari, viewed May 15, 2019).
Publication information from resource description page (Safari, viewed May 15, 2019).
Performer(s): Presenter, Dawid Czagan.
Description: 1 online resource (1 streaming video file (1 hr., 6 min., 28 sec.)) : digital, sound, color
Responsibility: Dawid Czagan.

Abstract:

"Automated SQL injection detection and exploitation has never been easier! This course will teach you how to find SQL injections in minutes with sqlmap. First, you will learn about the basics of this tool. Then, I will show you how to dump database table entries with sqlmap. After that, you will explore how to install a backdoor with sqlmap and how to go from SQL injection to remote code execution. Then, you will see how to maximize the power of SQL injection detection with this tool. Finally, you will learn how to use tamper scripts in this tool to bypass web application firewalls (WAF). By the end of the course, you will know how to automatically detect and exploit SQL injection vulnerabilities with sqlmap."--Resource description page.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1101904218> # How hackers find SQL injections in minutes with Sqlmap
    a schema:Movie, schema:CreativeWork, schema:VideoObject ;
    library:oclcnum "1101904218" ;
    rdfs:comment "Unknown 'gen' value: cig" ;
    schema:about <http://experiment.worldcat.org/entity/work/data/9399713681#Topic/hacking> ; # Hacking
    schema:about <http://experiment.worldcat.org/entity/work/data/9399713681#Topic/computer_security> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/9399713681#Topic/malware_computer_software> ; # Malware (Computer software)
    schema:about <http://experiment.worldcat.org/entity/work/data/9399713681#Topic/sql_computer_program_language> ; # SQL (Computer program language)
    schema:creator <http://experiment.worldcat.org/entity/work/data/9399713681#Person/czagan_dawid> ; # Dawid Czagan
    schema:datePublished "2019" ;
    schema:description ""Automated SQL injection detection and exploitation has never been easier! This course will teach you how to find SQL injections in minutes with sqlmap. First, you will learn about the basics of this tool. Then, I will show you how to dump database table entries with sqlmap. After that, you will explore how to install a backdoor with sqlmap and how to go from SQL injection to remote code execution. Then, you will see how to maximize the power of SQL injection detection with this tool. Finally, you will learn how to use tamper scripts in this tool to bypass web application firewalls (WAF). By the end of the course, you will know how to automatically detect and exploit SQL injection vulnerabilities with sqlmap."--Resource description page."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/9399713681> ;
    schema:inLanguage "en" ;
    schema:name "How hackers find SQL injections in minutes with Sqlmap"@en ;
    schema:productID "1101904218" ;
    schema:url <http://proquest.safaribooksonline.com/?fpi=9781838828790> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1101904218> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/9399713681#Person/czagan_dawid> # Dawid Czagan
    a schema:Person ;
    schema:familyName "Czagan" ;
    schema:givenName "Dawid" ;
    schema:name "Dawid Czagan" ;
    .

<http://experiment.worldcat.org/entity/work/data/9399713681#Topic/computer_security> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/9399713681#Topic/malware_computer_software> # Malware (Computer software)
    a schema:Intangible ;
    schema:name "Malware (Computer software)"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/9399713681#Topic/sql_computer_program_language> # SQL (Computer program language)
    a schema:Intangible ;
    schema:name "SQL (Computer program language)"@en ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.