• Online, Self-Paced
Course Description

Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data. This can be used to alter query logic to bypass security checks, or to insert additional statements that modify the back-end database, possibly including execution of system commands. This lab simulates a SQL Injection vulnerability that can be found in Shadow Bank which fails to validate input and consists of improper use of user input in SQL statements. Using Visual Studio Code participants will determine if the generated SQL query can be exploited.

Learning Objectives

On successful completion of this course, learners should have the knowledge and skills required to:

  • Determine if generated SQL queries can be exploited
  • Identify SQL injection vulnerabilities in Java
  • Fix the SQL Injection vulnerabilities without making any unnecessary changes to the code or the Java application
  • Determine if generated SQL queries can be exploited

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.