Buck  Buckridge

Buck Buckridge

1619838354

SQL Injection

Daniel demonstrates SQL Injection using sqlmap. This is one of his favourite tools.

  • SQL Injection Demo: 0:00
  • Daniel’s top 5 hacking tools: 1:40
  • SQL Injection: sqlmap and DVWA: 2:31
  • Don’t get shiny bracelets: 3:32
  • Start attack: 5:44
  • SQL tables: 8:00
  • SQL dump: 9:35
  • SQL Hashes: 9:45
  • DVWA explained: 12:40
  • sqlmap command: 15:27
  • url: 16:06
  • sqlmap uses the website: 17:34
  • Change URL to handle special characters: 19:21
  • cookies: 20:04
  • How to find cookies manually: 21:41
  • sqlmap switches dbs: 23:55
  • sqlmap tables: 26:30
  • sqlmap columns: 27:31
  • sqlmap dump: 28:29
  • Login as a user: 29:45
  • Why is it called sql injection: 30:41
  • Can you write to the database: 32:45
  • What do you want to see? 34:48
  • How to build the same network: 36:23
  • It is still used in the real world: 37:31
  • How to stop this: 38:30

Download software and VMs:

VM used: https://www.vulnhub.com/entry/websploit2018-1,253/
Kali Linux: https://www.kali.org/downloads/

#sql #database #developer

SQL Injection