Beginner’s Guide to sqlmap
Learn how to find your first SQL injection with the popular and powerful sqlmap tool
What you’ll learn
Beginner’s Guide to sqlmap
- Learn what sqlmap is and how it’s used to test web applications for SQL injection vulnerabilities
- Learn how to download and install the latest version of sqlmap
- Learn how to create a home lab environment to safely and legally attack web applications with SQL injections
- Learn about some of the most useful options and configurations sqlmap has to offer for beginners
- Find and exploit your first SQL injections with sqlmap
- Learn how to enumerate vulnerable database information (such as database names, schema, tables, and data within those tables)
- Learn how to use built-in password cracking functionality to extract and crack user passwords stored within vulnerable databases
Requirements
-
Experience with SQL (you should know what SQL is)
-
Experience working with web applications (you should understand how apps use databases)
-
Experience working with databases (at least a high-level understanding of how databases work)
-
Knowledge of different database engines (ie: you should know what MySQL means)
-
Fluent in English
Description
About the course:
Learn to use one of the most popular tools to find SQLÂ injection vulnerabilities:Â sqlmap.
In this course, we start by creating a simple, free, and quick home lab environment with Virtual Box, Kali Linux, and Docker. I’ll walk you through step-by-step how to do that, so don’t worry if it sounds intimidating! After that, we download and install the latest version of sqlmap. Then, we look at some of the most important and useful features and options for beginners to get started. Finally, we launch SQL injection attacks against our lab environment to extract information from the vulnerable database.
sqlmap can be used to extract information such as database schema, database names, table names, password hashes, and more. It even includes a built-in password cracker which we demonstrate by cracking all of the passwords stored in the user’s table of the database.
This course is meant to be easy to follow so that you can quickly learn how to get started with sqlmap. So whether you are interested in becoming a web pentester, or you are interested in learning how to make web applications more secure, this course will help you understand what tools and techniques can be used to automate SQL injection attacks and complement manual exploration.
———————–
Please note: Performing these attacks on environments you do not have explicit permissions for is illegal and will get you in trouble. That is not the purpose of this course. The purpose is to teach you how to secure your applications by providing a safe learning environment.
———————–
Instructor
My name is Christophe Limpalair, and I have helped thousands of individuals pass IT certifications, learn how to use the cloud, and develop secure applications. I got started in IT at the age of 11 and unintentionally fell into the world of cybersecurity. Fast-forward to today, and I’ve co-founded a fast-growing cybersecurity community, Cyber, that also provides training resources.
As IÂ developed a strong interest in programming and cloud computing, my focus for the past few years has been training thousands of individuals in small, medium, and large businesses (including Fortune 500) on how to use cloud providers (such as Amazon Web Services) efficiently, and how to develop more secure applications.
I’ve taught certification courses such as the AWSÂ Certified Developer, AWSÂ Certified SysOps Administrator, and AWSÂ Certified DevOps Professional, as well as non-certification courses such as Introduction to Application Security (AppSec), SQLÂ Injection Attacks, Introduction to OSÂ Command Injections, Lambda Deep Dive, Backup Strategies, and others.
Working with individual contributors as well as managers, IÂ realized that most were also facing serious challenges when it came to cybersecurity.
Digging deeper, it became clear that there was a lack of training for AppSec specifically. As we explore in the course, SQL injection vulnerabilities can be devastating when exploited, but preventing SQL injections is quite simple. So my goal with this course is to help you get started on your journey of learning the tools, techniques, and concepts to properly find injection vulnerabilities in your applications (or your client’s).
It’s time to take security into our own hands and to learn how to build more secure software to help make the world a safer place! Join me in the course, and we’ll do just that!
IÂ welcome you on your journey to learning more about sqlmap, and I look forward to being your instructor!
Who this course is for:
- Beginner web pentesters
- Web developers
- Application Security Engineers
- Pentesters
- Security Researchers
- Database Administrators
Add Comment