Identify and exploit a vulnerability by injecting SQL code

During in minutes 45
Start 2:00 pm
address 28 avenue George V 75008 Paris

You would like to find out how cybercriminals recover the contents of a database or take control of a web server?

In this workshop, we’ll show you how to identify and exploit a SQL code injection vulnerability, both manually and with an automated tool.

Two levels will be presented:
– Discovery: learn the basics of SQL code injection;
– Advanced: exploit the flaw by bypassing application firewall filters.

At the end of this workshop, you’ll be able to exploit a SQL code injection flaw yourself (on an application where you’re authorized to do so, of course!).

It will also give you an idea of the kind of skills you will acquire during the CEH training course.


Anthony Baube, Auditor & trainer in Cybersecurity