
SQL Injection Online Training
Lab Credits : Audi-1
Link : Audi-1
Apologies to Audi-1, for not mentioning his name for lab work before. All the lab work is of Audi. Hope students will get great benefit from his work.
SQL Injection is one of oldest and powerful threat to Web application, yet there is no great explanation to solve the problem and a hands on guide to master SQL Injection. In this course you will learn to design your own challenges along with the guidance to hack into those custom created sites for pentesting purposes.
If you are a Pentester or Hacker or Developer or Information Security enthusiastic, you will love this course for sure
So, No theories Just practical Videos to learn. Jump in into the course to get more.
Your Instructor

Trained as an Electronics Engineer and mastered as computer network and Information Security, Mr. Hitesh Choudhary is a renowned Author, video author, International speaker and security consultant. Also he is a got trained in wireless security from a prof. of MIT. He created various tools and attacks like wireless Eurynomus featured in pentest magazine and in Backtrack project. His webinar on wireless, Backtrack, and ethical hacking was attended by 2000+ professionals from Google India, HP, IBM, Accenture, TCS, Sapient Corp. , Symantec, EEL India Ltd., Capgemini, Micro Technology, CDAC, Kodak India Ltd., Wipro Infotech Ltd., ABB Ltd., Tech Mahindra Ltd., and many more. He is also an active consultant and speaker for police in India and Army Intelligence and his work was featured in 20+ air, print and live media.
If you want more than this brief info, join him at facebook or www.HiteshChouhdhary.com
Course Curriculum
-
StartError based Basic Injection (10:31)
-
StartMoving more into errors (7:54)
-
StartDumping the database for Challenge-solution 1 (9:18)
-
StartDumping via SQL (5:57)
-
StartWithout quote injection Challenge-solution 2 (10:02)
-
StartInjecting with OR and AND (6:41)
-
StartInjection challenge-solution 3 (5:04)
-
StartSQL injection Challenge-solution 4 (4:40)
-
StartImportant 26 commands for advance SQL Injection (22:21)
-
StartDouble query injection at challenge 5 (8:46)
-
StartDouble query exercise (6:35)
-
StartSQL commands for advance injection (7:45)
-
StartBlind injection Boolean Type (10:32)
-
StartCommand for time based injection (13:06)
-
StartTime based Injection Challenge-solution 8 (6:12)
-
StartDumping data injection (5:44)
-
StartDumping challenge-solution 9 (8:07)
-
StartPost injection challenge-solution 10 (9:18)
-
StartPost injection challenge-solution 11 (5:41)
-
StartPost injection double query commands (7:47)
-
StartDouble query challenge-solution 12 (5:40)
-
StartTime based post challenge-solution-13 (6:44)
-
StartNo HINT challenge 14 (2:32)
-
StartStripslashes and update query attack at challenge-solution-15 (11:04)
-
StartHeader Injecton by tamperdata at challenge-solution-16 (12:34)
-
StartCookie based injection at challenge-solution-17 (11:13)
-
StartEncoded injection via cookie at challenge-solution-18 (11:02)
-
StartChallenge 19 (1:37)
-
StartSecond order injection with filters challenge-solution-20 (9:11)
-
StartBlacklisted OR n AND challenge-solution-21 (6:04)
-
StartBlacklisted space n comments challenge-solution-22 (11:12)
-
StartAnalyzing important scripts code to inject (4:01)
-
StartPractice challenge 23 (1:30)
-
StartBlackListed Union and Select at challenge-solution-24 (5:37)
-
StartWAF and parameter polution