Discover how SQL Injection can be used to enumerate database table and column information or access files on the database server file system.
Certified Ethical Hacker - CEHv10: SQL Injection Types and Tools
- describe error-based and blind SQL Injection attacks that can be used to enumerate database table and column information
- use SQL Injection to read, write, and execute files on a remote system
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.