강의

멘토링

로드맵

BEST
Security & Network

/

Computer Security

SQL Injection Attack Techniques and Secure Coding Explained by a Simulated Hacking Practitioner: PART 1

SQL Injection, the flower of web hacking, explained by a mock hacking practitioner! Learn attack and defense at the same time.

(4.8) 108 reviews

1,154 learners

  • crehacktive
Penetration Testing
Injection

Reviews from Early Learners

What you will learn!

  • Building a basic understanding of vulnerabilities

  • Understand why vulnerabilities occur and the detailed principles

  • Identifying various attack points that occur in practice

  • Learn the attacks used in practice

  • Apply direct countermeasures to vulnerable functions and learn secure coding

📖 A series of SQL Injection attacks, taught by a simulated hacking expert!

  • PART (1): Basics / Practical Attacks / Secure CodingCurrent Course
    This course covers the most crucial aspects of SQL injection attacks, from the basics to practical attack techniques, various countermeasures, and secure coding. This course serves as a foundation for subsequent courses.

  • PART(2): Application / Advanced / Advanced
    This is training on applied attack techniques and advanced attack techniques not covered in PART(1).

  • PART(3): Creating an Automation Tool
    This training course will teach you how to create a Python-based automation tool by applying the attack techniques you have learned to an automation tool.

📖 Why should you learn SQL Injection?

A popular figure in the web hacking world! The fact that so many people are aware of the attack means its impact is significant, right?

Most web applications today feature dynamic page generation based on user input. In this environment, attackers face a growing number of attack targets, necessitating effective analysis methods and adaptive attack techniques tailored to each situation. Conversely, defenders often implement inline security solutions or secure coding for effective defense. Understanding attacks is crucial for effective defense, right?

📖 Attack techniques that can be applied immediately in practice!

For effective vulnerability analysis, you'll learn how to analyze various attack points using specific methodologies. You'll also learn the appropriate attack techniques and the specific environments in which they should be used. This course covers each attack technique used in practice in detail.

📖 Provides a PHP-based practice bulletin board for each DBMS!

We provide a practice bulletin board based on PHP-MYSQL, PHP-MSSQL, and PHP-ORACLE, through which you can practice SQL injection for various DBMS.

📖 Learn SQL Injection attack techniques and secure coding by following along!

Each technical element for completing SQL Injection attack techniques does not end in theory.
We will conduct hands-on training for each DBMS.

We'll take a closer look at the response measures for each function and conduct hands-on practice applying secure coding to vulnerable bulletin boards.

📖 Expected effects through education

  • If you're just starting to learn about SQL Injection, this course will serve as a guide to point you in the right direction.
  • If you already know about SQL Injection, you will experience the magic of connecting your scattered knowledge, and if you are lost, we will point you in the right direction.

🛠 Programs covered here

  • Burp Suite
  • APMSetup / MSSQL / ORACLE
  • QueryBox

※ How to use Burp Suite is not covered in this training. You can refer to the basic usage method in the training " Stories about Web Hacking and Simulated Hacking in the Field ".

🙋🏻‍♂️ Questions QnA

Q. I want to take the course, but is there anything I need to know beforehand?
A. Basically, you must know and listen to the basics of web and SQL grammar , and it is also recommended to take additional web hacking training.

Q. If I complete the training, can I get a practical diagnosis?
A. Of course! However, simply receiving training isn't enough. To achieve satisfactory results, you need to study and practice on your own. To achieve anything, you need to put in the effort.

Q. Why is the training time so much longer than that of other mock hacking training programs for SQL injection?
A. This training is specialized and covers only SQL injection, so it's bound to be long. Of course, the approach will also be completely different. While existing attack approaches are separate and distinct, this training connects them into a single, unified framework. You'll also discover why you need to carry out this type of attack.

Q. Can non-majors and students also take the course?
A. Of course! However, you must complete the required viewing lectures below and fully understand them before taking this course.

💡 Must-see lectures

Web Technology Fundamentals You Must Know
A course to learn the basics of web technology
Basic SQL Grammar for Successful SQL Injection Attacks
Basic Steps to Mastering SQL Injection Attacks

※ This training PPT uses Nanum font provided by Naver.

Recommended for
these people

Who is this course right for?

  • For those who want to learn SQL Injection properly

  • For practitioners who have difficulty finding SQL Injection vulnerabilities when diagnosing websites

  • For practitioners who only perform vulnerability diagnosis

  • People who can't attack without SQL Injection automation tool

  • For those who want to gather their knowledge about SQL Injection in one place.

  • If you want to know exactly what attack to do in what environment

  • For those who want to know the exact attack process

  • If you fail to provide the correct response plan

Need to know before starting?

  • Web Basics

  • Buff Suite Basic Usage

  • Web Hacking Basics

  • SQL Basic Grammar

Hello
This is

26,166

Learners

1,387

Reviews

502

Answers

4.9

Rating

18

Courses

안녕하세요, 크리핵티브입니다.

다년간 다양한 웹 서비스를 진단하고 연구한 경험을 바탕으로, 실무에 바로 적용 가능한 지식을 인프런 플랫폼에서 공유해오고 있습니다.

그리고 웹 해킹 기초를 체계적으로 다룬 크리핵티브의 한 권으로 끝내는 웹 해킹 바이블집필했습니다. 기초가 부족한 분들께는 이 책으로 학습을 시작하실 것을 권합니다.

 

Curriculum

All

123 lectures ∙ (24hr 31min)

Course Materials:

Lecture resources
Published: 
Last updated: 

Reviews

All

108 reviews

4.8

108 reviews

  • hackgenius226849님의 프로필 이미지
    hackgenius226849

    Reviews 4

    Average Rating 5.0

    Edited

    5

    80% enrolled

    I'm currently working at an information security company, so I wanted to take related training, and I applied for and attended this course. I am extremely satisfied as a result. The instructor's expertise is evident throughout the lecture. The more I listened to the lecture, the more ashamed I felt about only performing superficial diagnostics until now. I didn't know what kind of attacks to perform in what environment, but through this training, I was able to clearly understand what kind of attacks to perform depending on the environment. Also, the attack process that the instructor seems to have created personally will be really helpful in practical diagnostics. There are many times when I have to perform an attack... but I just stare blankly at the parameters and don't know what to do, but if I refer to this, I think I can smoothly perform the diagnostics sequentially. Oh, and that roadmap is amazing, I printed it out. I've only watched it once, but I'm going to watch it two more times as the instructor said. Thank you, instructor.

    • crehacktive
      Instructor

      Thank you so much for the long review! I'm so glad it was helpful. Thank you for your valuable review. Have a nice day~

  • webwh님의 프로필 이미지
    webwh

    Reviews 14

    Average Rating 4.5

    5

    94% enrolled

    I felt like I gained thorough knowledge because you explained each principle one by one. It was really good that I could immediately think of what to do first if I were to diagnose while organizing the process in my head. Since I am not a white hacker, I am currently creating an environment to practice using Django and Spring after listening to it twice more, and while developing, the process came to mind and I wanted to use filtering logic. Haha. Anyway, it was a great help and I am very happy! I want to watch the next lectures, Part 2, 3, and 4 soon! [Total 3 times + @ Added after class] After taking the first class, I started my career as a security consultant, and I was able to find SQLi vulnerabilities in almost every project with what I heard in CriHackTive's lecture. And most of all, when I saw consultants with n years of experience not understanding payload and asking me questions, I realized that CriHackTive's lecture had tremendous depth. Through repeated learning, I was able to use WAF bypass and efficient data retrieval in my practice. Thank you again.

    • crehacktive
      Instructor

      I'm so happy that the process came to mind. Thank you so much for writing a great review! I get strength from your valuable review. Thank you so much. I will make the next lectures well and open them. Please show a lot of interest and support.^^ Have a nice weekend~

  • springsik님의 프로필 이미지
    springsik

    Reviews 1

    Average Rating 5.0

    5

    100% enrolled

    I am a practitioner. It was a solid lecture from theory to practice. I won't say which training it was, but when I took other trainings, I felt like it was lacking overall, but it feels like it was filled up. Thank you for the great lecture.

    • hyeonseok985238님의 프로필 이미지
      hyeonseok985238

      Reviews 15

      Average Rating 5.0

      5

      99% enrolled

      I don't think there is a better lecture than this. It's the best lecture.

      • bryan님의 프로필 이미지
        bryan

        Reviews 8

        Average Rating 4.9

        5

        99% enrolled

        In the middle of the lecture, the content that said, "Think about the server-side DB query information while writing" really hit home. It's a good lecture~.

        $127.60

        crehacktive's other courses

        Check out other courses by the instructor!

        Similar courses

        Explore other courses in the same field!