Pluralsight | Ethical Hacking: SQL Injection [FCO]

  • Category Other
  • Type Tutorials
  • Language English
  • Total size 919.0 MB
  • Uploaded By SunRiseZone
  • Downloads 1220
  • Last checked 1 day ago
  • Date uploaded 6 years ago
  • Seeders 13
  • Leechers 5

Infohash : 3EAD69572A71F61578A7DB7D0126D05E4A5F8AB4



For More Udemy Free Courses >>> https://freetutorials.us/
For more Lynda and other Courses >>> https://www.freecoursesonline.me/
Forum for discussion >>> https://1hack.us/




Created by : Troy Hunt
Language : English
Updated : Sep 16, 2019
Duration : 5h 26m
Subtitle : Included
Torrent Contains : 165 Files, 10 Folders
Course Source : https://www.pluralsight.com/courses/ethical-hacking-sql-injection

About

Pluralsight is not an official partner or accredited training center of EC-Council. This course goes through how to detect SQL injection and identify risks as you to become an ethical hacker with a strong SQL injection understanding.

Description

Pluralsight is not an official partner or accredited training center of EC-Council. Ever since we started connecting websites to databases, SQL injection has been a serious security risk with dire ramifications. The ability for attackers to run arbitrary queries against vulnerable systems can result in data exposure, modification, and in some cases, entire system compromise. SQL injection is classified as the number one risk on the web today due to the "perfect storm" of risk factors. It's very easily discoverable, very easily exploited, and the impact of a successful attack is severe. Add to that the fact that injection risks remain rampant, it's clear how it deserves that number one spot. This course takes you through everything from understanding the SQL syntax used by attackers, basic injection attacks, database discovery and data exfiltration, advanced concepts, and even using injection for network reconnaissance and running system commands. It's everything an ethical hacker needs to know to be effective in identifying the SQL injection risk in target systems. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

Level

β€’ Beginner

About Author

Troy Hunt is a Microsoft Regional Director and MVP for Developer Security. He's a regular conference speaker, frequent blogger at troyhunt.com and is the creator of the data breach notification service known as β€œHave I Been Pwned”.



Files:

[FreeCoursesOnline.Me] [Pluralsight] Ethical Hacking SQL Injection [FCO] 0. Websites you may like
  • 0. (1Hack.Us) Premium Tutorials-Guides-Articles & Community based Forum.url (0.4 KB)
  • 1. (FreeTutorials.Us) Download Udemy Paid Courses For Free.url (0.3 KB)
  • 2. (FreeCoursesOnline.Me) Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url (0.3 KB)
  • 3. (NulledPremium.com) Download E-Learning, E-Books, Audio-Books, Comics, Articles and more... etc.url (0.2 KB)
  • 4. (FTUApps.com) Download Cracked Developers Applications For Free.url (0.2 KB)
  • How you can help Team-FTU.txt (0.2 KB)
01 - Why SQL Injection Matters
  • 01 - Overview.en.srt (3.8 KB)
  • 01 - Overview.mp4 (6.5 MB)
  • 02 - The Significance of SQL Injection.en.srt (7.7 KB)
  • 02 - The Significance of SQL Injection.mp4 (16.7 MB)
  • 03 - Executing a SQL Injection Attack.en.srt (9.3 KB)
  • 03 - Executing a SQL Injection Attack.mp4 (10.3 MB)
  • 04 - The Impact of a Successful Attack.en.srt (5.6 KB)
  • 04 - The Impact of a Successful Attack.mp4 (3.9 MB)
  • 05 - SQL Injection in the Wild.en.srt (3.5 KB)
  • 05 - SQL Injection in the Wild.mp4 (7.8 MB)
  • 06 - Summary.en.srt (1.9 KB)
  • 06 - Summary.mp4 (1.8 MB)
02 - Understanding SQL Queries
  • 07 - Overview.en.srt (4.8 KB)
  • 07 - Overview.mp4 (3.7 MB)
  • 08 - Understanding Structured Query Language.en.srt (10.8 KB)
  • 08 - Understanding Structured Query Language.mp4 (24.2 MB)
  • 09 - Statement Termination.en.srt (3.8 KB)
  • 09 - Statement Termination.mp4 (7.2 MB)
  • 10 - Using the SQL Comment Syntax.en.srt (3.6 KB)
  • 10 - Using the SQL Comment Syntax.mp4 (6.8 MB)
  • 11 - SQL Queries Versus Data.en.srt (6.9 KB)
  • 11 - SQL Queries Versus Data.mp4 (9.0 MB)
  • 12 - The Value of Internal Exceptions.en.srt (2.7 KB)
  • 12 - The Value of Internal Exceptions.mp4 (5.3 MB)
  • 13 - Summary.en.srt (3.6 KB)
  • 13 - Summary.mp4 (3.6 MB)
03 - The Mechanics of SQL Injection Attacks
  • 14 - Overview.en.srt (4.1 KB)
  • 14 - Overview.mp4 (3.1 MB)
  • 15 - Types of SQL Injection.en.srt (7.5 KB)
  • 15 - Types of SQL Injection.mp4 (6.2 MB)
  • 16 - The Single Character Injection Test.en.srt (11.8 KB)
  • 16 - The Single Character Injection Test.mp4 (32.4 MB)
  • 17 - Modifying the Query Structure.en.srt (13.2 KB)
  • 17 - Modifying the Query Structure.mp4 (21.3 MB)
  • 18 - Circumventing Website Logins.en.srt (10.7 KB)
  • 18 - Circumventing Website Logins.mp4 (9.6 MB)
  • 19 - Modifying Data and Database Objects.en.srt (7.4 KB)
  • 19 - Modifying Data and Database Objects.mp4 (8.2 MB)
  • 20 - Identifying the Risk in Code.en.srt (6.2 KB)
  • 20 - Identifying the Risk in Code.mp4 (15.3 MB)
  • 21 - Understanding and Detecting Input Sanitization.en.srt (6.8 KB)
  • 21 - Understanding and Detecting Input Sanitization.mp4 (5.1 MB)
  • 22 - Summary.en.srt (4.4 KB)
  • 22 - Summary.mp4 (4.2 MB)
04 - Discovering Schema and Extracting Data
  • 23 - Overview.en.srt (4.4 KB)
  • 23 - Overview.mp4 (3.7 MB)
  • 24 - Understanding the Union Operator.en.srt (5.5 KB)
  • 24 - Understanding the Union Operator.mp4 (10.1 MB)
  • 25 - Executing Union Injection.en.srt (18.2 KB)
  • 25 - Executing Union Injection.mp4 (42.5 MB)
  • 26 - Manual Database Structure Discovery with Error-based Injection.en.srt (9.4 KB)
  • 26 - Manual Database Structure Discovery with Error-based Injection.mp4 (31.3 MB)
  • 27 - Querying System Objects for Schema Discovery.en.srt (4.5 KB)
  • 27 - Querying System Objects for Schema Discovery.mp4 (10.3 MB)
  • 28 - Extracting Schema Details with Union Injection.en.srt (7.2 KB)
  • 28 - Extracting Schema Details with Union Injection.mp4 (14.5 MB)
  • 29 - Enumerating Result Sets with Sub-queries.en.srt (8.6 KB)
  • 29 - Enumerating Result Sets with Sub-queries.mp4 (17.5 MB)
  • 30 - Extracting Schema Details with Error-based Injection .en.srt (11.6 KB)
  • 30 - Extracting Schema Details with Error-based Injection .mp4 (33.3 MB)
  • 31 - Summary.en.srt (3.3 KB)
  • 31 - Summary.mp4 (3.4 MB)
05 - Blind SQL Injection
  • 32 - Overview.en.srt (4.3 KB)
  • 32 - Overview.mp4 (2.9 MB)
  • 33 - Basic and Blind Attack Success Criteria.en.srt (6.8 KB)
  • 33 - Basic and Blind Attack Success Criteria.mp4 (6.1 MB)
  • 34 - Understanding a Blind Attack.en.srt (7.0 KB)
  • 34 - Understanding a Blind Attack.mp4 (8.2 MB)
  • 35 - Applying Boolean Based Injection.en.srt (6.9 KB)
  • 35 - Applying Boolean Based Injection.mp4 (6.7 MB)
  • 36 - Constructing Yes and No Questions for Boolean Based Injection.en.srt (13.3 KB)
  • 36 - Constructing Yes and No Questions for Boolean Based Injection.mp4 (22.4 MB)
  • 37 - Enumerating via ASCII Values.en.srt (13.9 KB)
  • 37 - Enumerating via ASCII Values.mp4 (18.2 MB)
  • 38 - Where Time Based Injection Makes Sense.en.srt (3.5 KB)
  • 38 - Where Time Based Injection Makes Sense.mp4 (9.0 MB)
  • 39 - Understanding the WAITFOR DELAY Command.en.srt (3.6 KB)
  • 39 - Understanding the WAITFOR DELAY Command.mp4 (6.7 MB)
  • 40 - Constructing a Time Based Attack.en.srt (15.3 KB)
  • 40 - Constructing a Time Based Attack.mp4 (28.3 MB)
  • 41 - Summary.en.srt (3.0 KB)
  • 41 - Summary.mp4 (2.8 MB)
06 - Advanced SQL Injection Concepts
  • 42 - Overview.en.srt (4.7 KB)
  • 42 - Overview.mp4 (3.3 MB)
  • 43 - Database Server Feature Comparison.en.srt (11.4 KB)
  • 43 - Database Server Feature Comparison.mp4 (23.2 MB)
  • 44 - Establishing Account Identity and Rights.en.srt (8.1 KB)
  • 44 - Establishing Account Identity and Rights.mp4 (18.5 MB)
  • 45 - Enumerating Other Databases on the System.en.srt (8.9 KB)
  • 45 - Enumerating Other Databases on the System.mp4 (20.7 MB)
  • 46 - Creating Database Logins.en.srt (9.1 KB)
  • 46 - Creating Database Logins.mp4 (22.3 MB)
  • 47 - Extracting Passwords from SQL Server Hashes.en.srt (4.7 KB)
  • 47 - Extracting Passwords from SQL Server Hashes.mp4 (3.3 MB)
  • 48 - Replicating a Table Using OPENROWSET.en.srt (8.5 KB)
  • 48 - Replicating a Table Using OPENROWSET.mp4 (17.8 MB)
  • 49 - Executing Commands on the Operating System.en.srt (7.9 KB)
  • 49 - Executing Commands on the Operating System.mp4 (16.1 MB)
  • 50 - SQL Injection for Network Reconnaissance.en.srt (3.8 KB)
  • 50 - SQL Injection for Network Reconnaissance.mp4 (3.7 MB)
  • 51 - Summary.en.srt (6.1 KB)
  • 51 - Summary.mp4 (5.5 MB)
07 - Defending Against Attacks
  • 52 - Overview.en.srt (4.3 KB)
  • 52 - Overview.mp4 (3.0 MB)
  • 53 - Implement Proper Error Handling.en.srt (4.5 KB)
  • 53 - Implement Proper Error Handling.mp4 (11.1 MB)
  • 54 - Validating Untrusted Data.en.srt (8.0 KB)
  • 54 - Validating Untrusted Data.mp4 (23.2 MB)
  • 55 - Query Parameterization.en.srt (8.8 KB)
  • 55 - Query Parameterization.mp4 (21.0 MB)
  • 56 - Stored Procedures.en.srt (6.5 KB)
  • 56 - Stored Procedures.mp4 (10.9 MB)
  • 57 - Object Relational Mappers.en.srt (6.1 KB)
  • 57 - Object Relational Mappers.mp4 (11.2 MB)
  • 58 - The Principle of Least Privilege.en.srt (4.3 KB)
  • 58 - The Principle of Least Privilege.mp4 (3.0 MB)
  • 59 - Isolating the Database Network Segment.en.srt (7.5 KB)
  • 59 - Isolating the Database Network Segment.mp4 (7.9 MB)
  • 60 - Using an IDS or WAF.en.srt (8.2 KB)
  • 60 - Using an IDS or WAF.mp4 (15.9 MB)
  • 61 - Keeping Software Patched and Current.en.srt (4.6 KB)
  • 61 - Keeping Software Patched and Current.mp4 (12.9 MB)
  • 62 - Summary.en.srt (5.7 KB)
  • 62 - Summary.mp4 (4.6 MB)
08 - Evasion Techniques
  • 63 - Overview.en.srt (2.4 KB)
  • 63 - Overview.mp4 (1.7 MB)
  • 64 - Understanding Signatures.en.srt (4.6 KB)
  • 64 - Understanding Signatures.mp4 (4.5 MB)
  • 65 - Basic Evasion Techniques.en.srt (3.3 KB)
  • 65 - Basic Evasion Techniques.mp4 (2.9 MB)
  • 66 - Encoding for Evasion.en.srt (3.0 KB)
  • 66 - Encoding for Evasion.mp4 (2.1 MB)
  • 67 - Splitting Strings.en.srt (2.8 KB)
  • 67 - Splitting Strings.mp4 (2.2 MB)
  • 68 - White Space Diversity.en.srt (4.7 KB)
  • 68 - White Space Diversity.mp4 (4.5 MB)
  • 69 - Inline Comments.en.srt (4.4 KB)
  • 69 - Inline Comments.mp4 (3.9 MB)
  • 70 - Variables.en.srt (3.0 KB)
  • 70 - Variables.mp4 (2.6 MB)
  • 71 - String Manipulation.en.srt (5.2 KB)
  • 71 - String Manipulation.mp4 (6.7 MB)
  • 72 - Summary.en.srt (2.9 KB)
  • 72 - Summary.mp4 (2.7 MB)
09 - Automating Attacks
  • 73 - Overview.en.srt (4.3 KB)
  • 73 - Overview.mp4 (7.0 MB)
  • 74 - Testing in the Browser with SQL Inject Me.en.srt (6.6 KB)
  • 74 - Testing in the Browser with SQL Inject Me.mp4 (15.1 MB)
  • 75 - Fuzz Testing with Burp Suite.en.srt (17.1 KB)
  • 75 - Fuzz Testing with Burp Suite.mp4 (27.4 MB)
  • 76 - Data Extraction with Havij.en.srt (5.8 KB)
  • 76 - Data Extraction with Havij.mp4 (16.0 MB)
  • 77 - Schema Mapping with sqlmap.en.srt (6.1 KB)
  • 77 - Schema Mapping with sqlmap.mp4 (12.6 MB)
  • 78 - Dynamic Analysis Testing with NetSparker.en.srt (16.8 KB)
  • 78 - Dynamic Analysis Testing with NetSparker.mp4 (45.0 MB)
  • 79 - Summary.en.srt (3.8 KB)
  • 79 - Summary.mp4 (6.0 MB)
  • Exercise Files.zip (6.4 MB)

There are currently no comments. Feel free to leave one :)

Code:

  • udp://tracker.iamhansen.xyz:2000/announce
  • udp://tracker.torrent.eu.org:451/announce
  • udp://tracker.cyberia.is:6969/announce
  • udp://open.demonii.si:1337/announce
  • udp://tracker.uw0.xyz:6969/announce
  • udp://exodus.desync.com:6969/announce
  • udp://explodie.org:6969/announce
  • udp://denis.stalker.upeer.me:6969/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://9.rarbg.to:2710/announce
  • udp://tracker.tiny-vps.com:6969/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://tracker.coppersurfer.tk:6969/announce
  • udp://tracker.internetwarriors.net:1337/announce
  • udp://tracker.opentrackr.org:1337/announce
REVERSE-PROXY πŸ”„ RP (success) | 1304ms πŸ“„ torrent πŸ• 17 Jan 2026, 07:13:44 am IST ⏰ 11 Feb 2026, 07:13:44 am IST βœ… Valid for 24d 23h πŸ”„ Wait 10m