Course Description
Discover how SQL Injection can be used to enumerate database table and column information or access files on the database server file system.
Learning Objectives
Certified Ethical Hacker - CEHv10: SQL Injection Types and Tools
- describe error-based and blind SQL Injection attacks that can be used to enumerate database table and column information
- use SQL Injection to read, write, and execute files on a remote system