SQL Injection is a vulnerability that allows malicious actors to manipulate the syntax of database queries. Exploiting SQL Injection will most commonly enable attackers to extract arbitrary data from the database. Sometimes, SQL injection allows for the manipulation of data in the database. Under certain conditions, SQL Injection might allow manipulation of application functionality, such as bypassing authentication controls or executing arbitrary code on the database server.
This Skill Lab provides a virtual environment that contains a vulnerable application with its complete source code for training developers to identify and remediate SQL Injection vulnerabilities.
In this lab, the learner will receive hands-on experience testing for an SQL Injection vulnerability and implementing an appropriate mitigation. The typical solutions include replacing code that concatenates untrusted data into query syntax with code that uses prepared statements, parameterized stored procedures, or database access methods that do not require SQL syntax, such as object-relational mapping.
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.