This tool automates detecting and exploiting SQL injection flaws and taking over of database servers. The tool is useful for pen testers and has a powerful detection engine that performs database fingerprinting, accesses data from the database, access the underlying file system on the server and executes commands on OS via out-of-band connections.
Learning Objectives
Understand how to use this PenTesting tool
Framework Connections
Specialty Areas
- Data Administration
- Exploitation Analysis
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.