Hacker Attack and Defense SQLMAP Practical Edition

Hacker Attack and Defense SQLMAP Practical Edition

Course Description

This course starts with SQLMAP automatic injection, detecting get/post parameters, cookies, http headers, etc. in dynamic pages. It requires everyone to master five vulnerability detection technologies: Boolean-based blind injection detection, time-based blind injection detection, error-based detection, UNION-based joint query detection, and stacked query-based detection.

Course Catalog of Hacker Attack and Defense SQLMAP Practical Course

1. Overview of SQLMAP automatic injection (3)

2. SQLMAP automatic injection-five vulnerability detection techniques (3)

3. SQLMAP automatic injection - other features (3)

4. SQLMAP automatic injection-installation and TARGET_Get method

5. SQLMAP automatic injection-TARGET_POST method

6. SQLMAP automatic injection—REQUEST (data segment, variable separator, cookie)

7. SQLMAP automatic injection—REQUEST other HTTP headers

8. SQLMAP automatic injection—REQUEST HTTP-based authentication and http(s) proxy

9. SQLMAP automatic injection—REQUEST (delay, timeout, retries, randomize, scope, safe-url, and --safe-freq)

10. SQLMAP automatic injection—OPTIMIZATION performance optimization (2)

11. SQLMAP automatic injection—INJECTION (2)

12. SQLMAP automatic injection—DETECTION, TECHNIQUES, FINGERPRINT (2)

13. SQLMAP automatic injection—ENUMERATION and BRUTE FORCE (2)

14. SQLMAP automatic injection - UDF INJECTION, FILE SYSTEM, OS, WINDOWS REGISTORY, GENERAL, MISCELLANEOUS (2)

<<:  Detailed introduction to activity operation (I): Preliminary preparation for the activity

>>:  How to reduce the cost of attracting new customers through event invitations?

Recommend

It can "breathe fire"! Be careful when buying it

Can you buy a hair dryer for 15 yuan? Is it safe?...

Zhang Ce: The Making of a Short Video Director, Short Video Creation Course

It’s simple and easy to understand, and you can t...

This is a versatile activity plan!

A universal activity plan , so you don’t have to ...

How to operate and promote industrial Internet products?

The operation of industrial Internet products is ...

Liu Rongjun, "3M: How to build an innovative enterprise"

Liu Rongjun's "3M: How to Build an Innov...

Cherries are free, but you don’t have “cherry freedom”

Are the "cherries" in your mind really ...

Stay away from big trucks! The driver really can't see you!

Audit expert: Zhu Guangsi Member of Beijing Scien...

Take a deep breath, this "oxygen" is really good!

Speaking of athletes’ training and recovery, yest...

Case review + fission methodology | Why is your fission activity ineffective?

The fission gameplay template is important, but w...