5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

Certification     EC-Council     Certified Ethical Hacker (CEH)     Certified Ethical Hacker (CEH) v11

SQL injection is typically used to access sensitive information from a target's database, but under the right circumstances, it can be used to access the remote file system or even allow for remote system shell access. In this course, you'll learn the SQLi techniques used to read and write to files on the target system, as well as gain interactive shell access. Manual SQL injection testing is a necessary skill, but often time to test is limited and it's useful to have a tool like SQLMap. You'll finish this course by learning how to use SQLMap to automate the process of testing SQL injections. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.



Objectives

CEHv11: SQL Injection & SQLMap

  • describe the SQL Injection techniques used to write a file on a target system
  • identify the SQL statements that can be used to write files to a target system using SQLi and that could allow an attacker to gain interactive shell access
  • recognize the limitations of using SQLi techniques to read a file
  • use SQLi techniques to read a file on a target system
  • describe the sqlmap requirements in order to automate SQL injections
  • identify sqlmap options to enumerate data from SQL Injections
  • recognize how to use sqlmap to automate detection and enumeration of SQL injections