강의

멘토링

로드맵

Inflearn brand logo image
BEST
Security & Network

/

Computer Security

SQL Injection Attack Techniques and Secure Coding Explained by a Simulated Hacking Practitioner: PART 1

SQL Injection, the flower of web hacking, explained by a mock hacking practitioner! Learn attack and defense at the same time.

(4.8) 105 reviews

1,134 learners

  • crehacktive
Penetration Testing
Injection

Reviews from Early Learners

What you will learn!

  • Building a basic understanding of vulnerabilities

  • Understand why vulnerabilities occur and the detailed principles

  • Identifying various attack points that occur in practice

  • Learn the attacks used in practice

  • Apply direct countermeasures to vulnerable functions and learn secure coding

📖 A series of SQL Injection attacks, taught by a simulated hacking expert!

  • PART (1): Basics / Practical Attacks / Secure CodingCurrent Course
    This course covers the most crucial aspects of SQL injection attacks, from the basics to practical attack techniques, various countermeasures, and secure coding. This course serves as a foundation for subsequent courses.

  • PART(2): Application / Advanced / Advanced
    This is training on applied attack techniques and advanced attack techniques not covered in PART(1).

  • PART(3): Creating an Automation Tool
    This training course will teach you how to create a Python-based automation tool by applying the attack techniques you have learned to an automation tool.

📖 Why should you learn SQL Injection?

A popular figure in the web hacking world! The fact that so many people are aware of the attack means its impact is significant, right?

Most web applications today feature dynamic page generation based on user input. In this environment, attackers face a growing number of attack targets, necessitating effective analysis methods and adaptive attack techniques tailored to each situation. Conversely, defenders often implement inline security solutions or secure coding for effective defense. Understanding attacks is crucial for effective defense, right?

📖 Attack techniques that can be applied immediately in practice!

For effective vulnerability analysis, you'll learn how to analyze various attack points using specific methodologies. You'll also learn the appropriate attack techniques and the specific environments in which they should be used. This course covers each attack technique used in practice in detail.

📖 Provides a PHP-based practice bulletin board for each DBMS!

We provide a practice bulletin board based on PHP-MYSQL, PHP-MSSQL, and PHP-ORACLE, through which you can practice SQL injection for various DBMS.

📖 Learn SQL Injection attack techniques and secure coding by following along!

Each technical element for completing SQL Injection attack techniques does not end in theory.
We will conduct hands-on training for each DBMS.

We'll take a closer look at the response measures for each function and conduct hands-on practice applying secure coding to vulnerable bulletin boards.

📖 Expected effects through education

  • If you're just starting to learn about SQL Injection, this course will serve as a guide to point you in the right direction.
  • If you already know about SQL Injection, you will experience the magic of connecting your scattered knowledge, and if you are lost, we will point you in the right direction.

🛠 Programs covered here

  • Burp Suite
  • APMSetup / MSSQL / ORACLE
  • QueryBox

※ How to use Burp Suite is not covered in this training. You can refer to the basic usage method in the training " Stories about Web Hacking and Simulated Hacking in the Field ".

🙋🏻‍♂️ Questions QnA

Q. I want to take the course, but is there anything I need to know beforehand?
A. Basically, you must know and listen to the basics of web and SQL grammar , and it is also recommended to take additional web hacking training.

Q. If I complete the training, can I get a practical diagnosis?
A. Of course! However, simply receiving training isn't enough. To achieve satisfactory results, you need to study and practice on your own. To achieve anything, you need to put in the effort.

Q. Why is the training time so much longer than that of other mock hacking training programs for SQL injection?
A. This training is specialized and covers only SQL injection, so it's bound to be long. Of course, the approach will also be completely different. While existing attack approaches are separate and distinct, this training connects them into a single, unified framework. You'll also discover why you need to carry out this type of attack.

Q. Can non-majors and students also take the course?
A. Of course! However, you must complete the required viewing lectures below and fully understand them before taking this course.

💡 Must-see lectures

Web Technology Fundamentals You Must Know
A course to learn the basics of web technology
Basic SQL Grammar for Successful SQL Injection Attacks
Basic Steps to Mastering SQL Injection Attacks

※ This training PPT uses Nanum font provided by Naver.

Recommended for
these people

Who is this course right for?

  • For those who want to learn SQL Injection properly

  • For practitioners who have difficulty finding SQL Injection vulnerabilities when diagnosing websites

  • For practitioners who only perform vulnerability diagnosis

  • People who can't attack without SQL Injection automation tool

  • For those who want to gather their knowledge about SQL Injection in one place.

  • If you want to know exactly what attack to do in what environment

  • For those who want to know the exact attack process

  • If you fail to provide the correct response plan

Need to know before starting?

  • Web Basics

  • Buff Suite Basic Usage

  • Web Hacking Basics

  • SQL Basic Grammar

Hello
This is

25,880

Learners

1,361

Reviews

497

Answers

4.9

Rating

18

Courses

:: 국내 정보보안 솔루션 개발 기업 재직 ::
- 앱 위변조 방지 솔루션 : 미들웨어 담당 / 해킹 대회 운영진 / 국내 유명 해킹/방어 훈련장 제작

:: 국내 정보보안 전문 업체 재직 ::
- 블랙박스 모의해킹 / 시나리오 기반 모의해킹 / 웹 취약점 진단 / 모바일 취약점 진단 / 소스코드 취약점 진단 / APT 모의 훈련 / DDoS 모의훈련 / 인프라 진단 / 스마트 가전 진단
- 국내 대기업, 중소기업 다수 진단

:: 외부 교육 및 활동 ::
- 멀티캠퍼스, 국가 보안 기술 연구소(ETRI)
- 국내 정보보안 업체 : 재직자 대상 "웹 모의해킹 심화 교육" 진행중
- 해커팩토리 문제 제작

:: 취약점 발견 ::

1) Web Application Server 취약점
- TMAX JEUS : 원격 명령어 실행 취약점(Remote Command Execution Vulnerability)
- IBM WebSphere(CVE-2020-4163) : 원격 명령어 실행 취약점(Remote Command Execution Vulnerability)

2) CMS(Contents Management System) 취약점
- 네이버 스마트에디터 : 파일 업로드 취약점
- 그누보드 : SQL Injection , 파일 업로드 취약점(그누보드4, 그누보드5), XSS ...
- 킴스큐 : 파리미터 변조 취약점 , 파일 업로드 취약점

* 이메일 : crehacktive3@naver.com
* 블로그 : http://www.crehacktive.co.kr

Curriculum

All

123 lectures ∙ (24hr 31min)

Course Materials:

Lecture resources
Published: 
Last updated: 

Reviews

All

105 reviews

4.8

105 reviews

  • hackgenius226849님의 프로필 이미지
    hackgenius226849

    Reviews 4

    Average Rating 5.0

    Edited

    5

    80% enrolled

    I'm currently working at an information security company, so I wanted to take related training, and I applied for and attended this course. I am extremely satisfied as a result. The instructor's expertise is evident throughout the lecture. The more I listened to the lecture, the more ashamed I felt about only performing superficial diagnostics until now. I didn't know what kind of attacks to perform in what environment, but through this training, I was able to clearly understand what kind of attacks to perform depending on the environment. Also, the attack process that the instructor seems to have created personally will be really helpful in practical diagnostics. There are many times when I have to perform an attack... but I just stare blankly at the parameters and don't know what to do, but if I refer to this, I think I can smoothly perform the diagnostics sequentially. Oh, and that roadmap is amazing, I printed it out. I've only watched it once, but I'm going to watch it two more times as the instructor said. Thank you, instructor.

    • crehacktive
      Instructor

      Thank you so much for the long review! I'm so glad it was helpful. Thank you for your valuable review. Have a nice day~

  • webwh님의 프로필 이미지
    webwh

    Reviews 14

    Average Rating 4.5

    5

    94% enrolled

    I felt like I gained thorough knowledge because you explained each principle one by one. It was really good that I could immediately think of what to do first if I were to diagnose while organizing the process in my head. Since I am not a white hacker, I am currently creating an environment to practice using Django and Spring after listening to it twice more, and while developing, the process came to mind and I wanted to use filtering logic. Haha. Anyway, it was a great help and I am very happy! I want to watch the next lectures, Part 2, 3, and 4 soon! [Total 3 times + @ Added after class] After taking the first class, I started my career as a security consultant, and I was able to find SQLi vulnerabilities in almost every project with what I heard in CriHackTive's lecture. And most of all, when I saw consultants with n years of experience not understanding payload and asking me questions, I realized that CriHackTive's lecture had tremendous depth. Through repeated learning, I was able to use WAF bypass and efficient data retrieval in my practice. Thank you again.

    • crehacktive
      Instructor

      I'm so happy that the process came to mind. Thank you so much for writing a great review! I get strength from your valuable review. Thank you so much. I will make the next lectures well and open them. Please show a lot of interest and support.^^ Have a nice weekend~

  • springsik님의 프로필 이미지
    springsik

    Reviews 1

    Average Rating 5.0

    5

    100% enrolled

    I am a practitioner. It was a solid lecture from theory to practice. I won't say which training it was, but when I took other trainings, I felt like it was lacking overall, but it feels like it was filled up. Thank you for the great lecture.

    • hyeonseok985238님의 프로필 이미지
      hyeonseok985238

      Reviews 15

      Average Rating 5.0

      5

      99% enrolled

      I don't think there is a better lecture than this. It's the best lecture.

      • bryan님의 프로필 이미지
        bryan

        Reviews 8

        Average Rating 4.9

        5

        99% enrolled

        In the middle of the lecture, the content that said, "Think about the server-side DB query information while writing" really hit home. It's a good lecture~.

        $127.60

        crehacktive's other courses

        Check out other courses by the instructor!

        Similar courses

        Explore other courses in the same field!