دوره Cybr – The Practical Guide to sqlmap for SQL Injection

  • Cybr
  • 3,508 بازدید
  • 0 نظر

Learn how to use sqlmap in-depth for professional engagements like pentests or bug bounties. sqlmap is the most powerful and widely used SQL injection tool, and for good reason. It packs an impressive array of features and options specifically crafted to fingerprint, enumerate, and takeover databases as well as underlying systems. In this course, we take a look at all of that. We start by looking at the sqlmap project, including how the source code repository is structured, where to find important files such as configuration and payload files, and how to set up a home lab environment to safely and legally practice what we’re learning. Then, we explore every single option that sqlmap offers with examples and explanations of how and when to use the option(s). We learn tips & tricks to see what sqlmap is doing under the hood and to troubleshoot when we come across issues. Once we’ve covered sqlmap’s options and features, we tie it all together by running through scenarios. This is when we get to see how those options can be used together or on their own to achieve our pentest or bug bounty objectives. The course also includes sections dedicated to specific topics such as bypassing WAFs and evading security controls, and how to run sqlmap as an API.

Syllabus

  1. About the Course
  2. Setting up our lab environment
  3. sqlmap Overview
  4. sqlmap Options Deep Dive
  5. Main Options
  6. Requests Options
  7. Optimizations Options
  8. Injections Options
  9. Detection Options
  10. Techniques Options
  11. Fingerprinting Options
  12. Enumeration Options
  13. Brute Force Options
  14. UDF Options
  15. File, OS, and Windows registry access
  16. General & Miscellaneous
  17. sqlmap in action
  18. Bypassing WAFs
  19. Running sqlmap as an API
  20. Conclusion

Cybr – The Practical Guide to sqlmap for SQL Injection