In this workshop, we’ll show you how to identify and exploit a SQL code injection vulnerability, both manually and with an automated tool.
Two levels will be presented:
– Discovery: learn the basics of SQL code injection;
– Advanced: exploit the flaw by bypassing application firewall filters.
At the end of this workshop, you’ll be able to exploit a SQL code injection flaw yourself (on an application where you’re authorized to do so, of course!).
It will also give you an idea of the kind of skills you will acquire during the CEH training course.
Anthony Baube, Auditor & trainer in Cybersecurity