Time
4 hours 20 minutes
Difficulty
Intermediate
CEU/CPE
5

Video Description

This brief lesson offers an introduction into the SQLI Lab which will focus on two things: • Lab discovery • Lab Exploitation

Video Transcription

00:04
welcome to cyber ery. I'm Raymond of it, and I will be your subject matter expert for CyberRays Web at penetration testing course. In this video, we will be discussing sequel injection Lab.
00:14
This lab should take about 30 minutes to complete. It will be covered. We're going to be discussing the discovery portion of the sequel Injection Lab. And then we're also going to be talking about the exploitation portion of the sequel Injection Lab. So for the Discovery portion, using either Vega or Zap,
00:32
I would recommend zapped. Does it? Attack Proxy is an awesome Web scanner.
00:36
Scan the sequelae to shell Web page for a sequel. Vulnerability. Once that vulnerability is discovered,
00:43
we're gonna move on to exploitation. So using sequel map, exploit the Web page, which was identified in your scan
00:50
after you exploited the Web page,
00:53
dumped the database and discovered the username and password for the Web page.
00:59
Remember
01:00
the options and secret map that would cover to do this So it was covered. Talk about the discovery portion of the sequel injection lab, and we also talked about exploitation. So
01:11
have fun
01:11
and ah,
01:14
happy hacking

Up Next

Web Application Penetration Testing

In this web application penetration testing course, SME, Raymond Evans, takes you on a wild and fascinating journey into the cyber security discipline of web application pentesting. This is a very hands-on course that will require you to set up your own pentesting environment.

Instructed By

Instructor Profile Image
Raymond Evans
Instructor