Trainning
Ctrlk
  • WEEK 2
    • Tìm hiểu các thành phần hệ điều hành
    • TryHackMe| Abusing Windows Internals
  • WEEK 3
    • Một số phương thức Persistence
    • Các Phương thức tấn công Process nâng cao
    • Implement tấn công
  • week 4
    • Linux
    • PROCESS LIST
    • Network
  • WEEK 5
    • Các dạng tấn công trong network phổ biến (SYNC Flood, MAC flood,...)
    • Reconnaissance
    • Active Directory
    • NTLM vs Kerberos
    • Stealing Windows Credentials
    • LLMNR Poisoning, NTLM Replay
  • WEEK 6 + 7
    • DOM-based vulnerabilities
    • SQL Injection
      • Lab: Retrieving hidden data
      • Lab: Subvering application logic
      • SQL injection UNION attacks
      • Blind SQL Injection
      • Examining the database
        • Lab: SQL injection attack, querying the database type and version on Oracle
        • Lab: SQL injection attack, querying the database type and version on MySQL and Microsoft
        • Lab: SQL injection attack, listing the database contents on non-Oracle databases
        • Lab: SQL injection attack, listing the database contents on Oracle
      • Che dấu cuộc tấn công bằng Encode
    • Authentication
    • Access Control
    • Path Traversal
    • Command Injection
    • File uploads
    • Server-side request forgery (SSRF)
    • Cross-site scripting
    • Cross-site request forgery (CSRF)
    • Insecure deserializaton
    • Burp Suite
    • Tóm tắt
  • Week 8
    • Rà soát mã độc
Powered by GitBook
On this page
  1. WEEK 6 + 7
  2. SQL Injection

Examining the database

Lab: SQL injection attack, querying the database type and version on OracleLab: SQL injection attack, querying the database type and version on MySQL and MicrosoftLab: SQL injection attack, listing the database contents on non-Oracle databasesLab: SQL injection attack, listing the database contents on Oracle
PreviousLab: Blind SQL injection with out-of-band data exfiltrationNextLab: SQL injection attack, querying the database type and version on Oracle