SQL Injection, the flower of web hacking, explained by a mock hacking practitioner! Learn attack and defense at the same time.
Building a basic understanding of vulnerabilities
Understand why vulnerabilities occur and the detailed principles
Identifying various attack points that occur in practice
Learn the attacks used in practice
Apply direct countermeasures to vulnerable functions and learn secure coding
A popular character in the web hacking world! The more people know about it, the more influential the attack is, right?
Most of today's web applications have many functions that dynamically configure pages through user input values. In this environment, from the attacker's perspective , as the number of attack targets increases, effective analysis methods and attack techniques for each situation are required. On the other hand, from the defender's perspective , for effective defense, security solutions are installed in the inline section or secure coding is performed. You have to know the attack to know how to defend, right?
In order to effectively analyze vulnerabilities, you will learn how to analyze various attack points using different methodologies, what kind of attack to do in what environment, and the attack techniques according to these criteria. We will cover each attack technique used in this practice in detail.
We provide a practice bulletin board based on PHP-MYSQL, PHP-MSSQL, and PHP-ORACLE, through which you can practice SQL Injection for various DBMS.
Each technical element for completing the SQL Injection attack technique does not end in theory.
We will provide hands-on training for each DBMS.
We will examine the response measures for each function in detail and conduct a hands-on exercise to directly apply secure coding to vulnerable bulletin boards.
※ How to use Burp Suite is not covered in this training. You can refer to the basic usage method in the training " Stories about Web Hacking and Simulated Hacking in the Field ".
Q. I want to take the course, but is there anything I need to know beforehand?
A. Basically, you must know and listen to web fundamentals and basic SQL grammar , and it is also recommended to take additional web hacking training.
Q. If I complete the training, can I get a practical diagnosis?
A. Of course! However, it is not something that can be achieved by just receiving education. In order to perform an act of attack, you need to study and practice enough on your own to obtain satisfactory results. In order to obtain something, it is necessary to make efforts.
Q. Why is the training time so long compared to other mock hacking training programs' SQL Injection training?
A. This training is a specialized training that only covers SQL Injection, so it is bound to be long. Of course, the approach will be completely different. If the existing attack approach methods are separate for each attack, this training can be seen as connecting them into one. And you can find out why you should do this kind of attack.
Q. Can non-majors and students also take the course?
A. Of course! However, if you take the required viewing lectures below and fully understand them, you can take this training.
※ Nanum font provided by Naver is used in this training PPT.
Who is this course right for?
For those who want to learn SQL Injection properly
For practitioners who have difficulty finding SQL Injection vulnerabilities when diagnosing websites
For practitioners who only perform vulnerability diagnosis
People who can't attack without SQL Injection automation tool
For those who want to gather their knowledge about SQL Injection in one place.
If you want to know exactly what attack to do in what environment
For those who want to know the exact attack process
If you fail to provide the correct response plan
Need to know before starting?
Web Basics
Buff Suite Basic Usage
Web Hacking Basics
SQL Basic Grammar
24,683
Students
1,215
Reviews
492
Answers
4.9
Rating
18
Courses
:: 국내 정보보안 솔루션 개발 기업 재직 ::
- 앱 위변조 방지 솔루션 : 미들웨어 담당 / 해킹 대회 운영진 / 국내 유명 해킹/방어 훈련장 제작
:: 국내 정보보안 전문 업체 재직 ::
- 블랙박스 모의해킹 / 시나리오 기반 모의해킹 / 웹 취약점 진단 / 모바일 취약점 진단 / 소스코드 취약점 진단 / APT 모의 훈련 / DDoS 모의훈련 / 인프라 진단 / 스마트 가전 진단
- 국내 대기업, 중소기업 다수 진단
:: 외부 교육 및 활동 ::
- 멀티캠퍼스, 국가 보안 기술 연구소(ETRI)
- 국내 정보보안 업체 : 재직자 대상 "웹 모의해킹 심화 교육" 진행중
- 해커팩토리 문제 제작
:: 취약점 발견 ::
1) Web Application Server 취약점
- TMAX JEUS : 원격 명령어 실행 취약점(Remote Command Execution Vulnerability)
- IBM WebSphere(CVE-2020-4163) : 원격 명령어 실행 취약점(Remote Command Execution Vulnerability)
2) CMS(Contents Management System) 취약점
- 네이버 스마트에디터 : 파일 업로드 취약점
- 그누보드 : SQL Injection , 파일 업로드 취약점(그누보드4, 그누보드5), XSS ...
- 킴스큐 : 파리미터 변조 취약점 , 파일 업로드 취약점
* 이메일 : crehacktive3@naver.com
* 블로그 : http://www.crehacktive.co.kr
All
123 lectures ∙ (24hr 31min)
Course Materials: