Hacker Attack and Defense SQLMAP Practical Edition

Hacker Attack and Defense SQLMAP Practical Edition

Course Description

This course starts with SQLMAP automatic injection, detecting get/post parameters, cookies, http headers, etc. in dynamic pages. It requires everyone to master five vulnerability detection technologies: Boolean-based blind injection detection, time-based blind injection detection, error-based detection, UNION-based joint query detection, and stacked query-based detection.

Course Catalog of Hacker Attack and Defense SQLMAP Practical Course

1. Overview of SQLMAP automatic injection (3)

2. SQLMAP automatic injection-five vulnerability detection techniques (3)

3. SQLMAP automatic injection - other features (3)

4. SQLMAP automatic injection-installation and TARGET_Get method

5. SQLMAP automatic injection-TARGET_POST method

6. SQLMAP automatic injection—REQUEST (data segment, variable separator, cookie)

7. SQLMAP automatic injection—REQUEST other HTTP headers

8. SQLMAP automatic injection—REQUEST HTTP-based authentication and http(s) proxy

9. SQLMAP automatic injection—REQUEST (delay, timeout, retries, randomize, scope, safe-url, and --safe-freq)

10. SQLMAP automatic injection—OPTIMIZATION performance optimization (2)

11. SQLMAP automatic injection—INJECTION (2)

12. SQLMAP automatic injection—DETECTION, TECHNIQUES, FINGERPRINT (2)

13. SQLMAP automatic injection—ENUMERATION and BRUTE FORCE (2)

14. SQLMAP automatic injection - UDF INJECTION, FILE SYSTEM, OS, WINDOWS REGISTORY, GENERAL, MISCELLANEOUS (2)

<<:  Detailed introduction to activity operation (I): Preliminary preparation for the activity

>>:  How to reduce the cost of attracting new customers through event invitations?

Recommend

Are all animals color blind? Their vision may be richer than yours!

Should I buy the same toy ball in red or green? W...

How to effectively and accurately reach users with activities

In fact, in the user-operated activity-based mark...

Do you know what threats your mobile devices face?

Phishing and scams When phishing occurs, cybercri...

Leg cramps during sleep are not just a matter of calcium deficiency

Many people may have had this experience: sleepin...

Analyst: China's business has become a burden for Apple

A new year brings new prospects, and so does Appl...

Can pushing Feiliu to go public revive NetQin’s stock price?

Because its stock price is undervalued, Qihoo 360...

Explain the basic logic of Internet advertising all at once!

Since the advent of the Internet, the age-old ind...

Analysis of Yuanqi Forest’s user growth!

In 2020, a beverage emerged out of nowhere and qu...

Will AI make scientists unemployed? This answer is unexpected

The field of generative artificial intelligence i...