SQL Injection Master Course by Hitesh ChoudHary

seeders: 0
leechers: 11
Added on November 26, 2015 by novice-proin Other > Tutorials
Torrent verified.



SQL Injection Master Course by Hitesh ChoudHary (Size: 464.24 MB)
 Lecture 1 - Course Introduction.mp412.24 MB
 Lecture 3 - Legal advice before starting.mp41.57 MB
 Lecture 2 - Introduction to Instructor.mp41.11 MB
 Lecture 7 - Linux Setup Installation.mp49.86 MB
 Lecture 6 - Windows Setup Installation.mp49.32 MB
 Lecture 4 - SQL Injection.mp48.01 MB
 Lecture 5 - Security misconception.mp47.52 MB
 Lecture 16 - Important 26 commands for advance SQL Injection.mp428.56 MB
 Lecture 32 - Header Injecton by tamperdata at challenge-solution-16.mp421.34 MB
 Lecture 10 - Dumping the database for Challenge-solution 1.mp418.59 MB
 Lecture 34 - encoded injection via cookie at challenge-solution-18.mp418.35 MB
 Lecture 33 - cookie based injection at challenge-solution-17.mp417.58 MB
 Lecture 38 - Blacklisted space n comments challenge-solution-22.mp416.8 MB
 Lecture 20 - Blind injection Boolean Type.mp416.69 MB
 Lecture 31 - stripslashes and update query attack at challenge-solution-15.mp416.44 MB
 Lecture 12 - Without quote injection Challenge-solution 2.mp416.26 MB
 Lecture 21 - command for time based injection.mp415.6 MB
 Lecture 43 - Outro.mp41.29 MB


Description

Course Description

SQL Injection is one of oldest and powerful threat to Web application, yet there is no great explanation to solve the problem and a hands on guide to master SQL Injection. In this course you will learn to design your own challenges along with the guidance to hack into those custom created sites for pentesting purposes.

If you are a Pentester or Hacker or Developer or Information Security enthusiastic, you will love this course for sure

So, No theories Just practical Videos to learn. Jump in into the course to get more.
Full details
What are the requirements?

Headphones
Internet

What am I going to get from this course?

Over 43 lectures and 6 hours of content!
Master SQL injection in depth

What is the target audience?

All are welcome

Curriculum
Section 1: Introduction to SQL injection
Lecture 1
Course Introduction
10:05
Lecture 2
Introduction to Instructor
00:59
Lecture 3
Legal advice before starting
01:08
Section 2: SQL Master Section
Lecture 4
SQL Injection
05:35
Lecture 5
security misconceptions
05:28
Lecture 6
windows setup installation
07:16
Lecture 7
Linux setup installation
07:38
Section 3: Installation of personal lab
Lecture 8
Error based Basic Injection
10:31
Lecture 9
Moving more into errors
07:54
Lecture 10
Dumping the database for Challenge-solution 1
09:18
Lecture 11
Dumping via SQL
05:57
Lecture 12
Without quote injection Challenge-solution 2
10:02
Lecture 13
Injecting with OR and AND
06:41
Lecture 14
Injection challenge-solution 3
05:04
Lecture 15
SQL injection Challenge-solution 4
04:40
Lecture 16
16 Important 26 commands for advance SQL Injection
22:21
Lecture 17
17 double query injection at challenge 5
08:46
Lecture 18
18 double query exercise
06:35
Lecture 19
19 SQL commands for advance injection
07:45
Lecture 20
20 Blind injection Boolean Type
10:32
Lecture 21
21 command for time based injection
13:06
Lecture 22
22 time based Injection Challenge-solution 8
06:12
Lecture 23
23 Dumping data injection
05:44
Lecture 24
24 dumping challenge-solution 9
08:07
Lecture 25
25 post injection challenge-solution 10
09:18
Lecture 26
26 post injection challenge-solution 11
05:41
Lecture 27
27 post injection double query commands
07:47
Lecture 28
28 double query challenge-solution 12
05:41
Lecture 29
29 time based post challenge-solution-13
06:44
Lecture 30
30 no HINT challenge 14
02:32
Lecture 31
31 stripslashes and update query attack at challenge-solution-15
11:04
Lecture 32
32 Header Injecton by tamperdata at challenge-solution-16
12:34
Lecture 33
33 cookie based injection at challenge-solution-17
11:13
Lecture 34
34 encoded injection via cookie at challenge-solution-18
11:02
Lecture 35
35 challenge 19
01:37
Lecture 36
36 second order injection with filters challenge-solution-20
09:11
Lecture 37
37 Blacklisted OR n AND challenge-solution-21
06:04
Lecture 38
38 Blacklisted space n comments challenge-solution-22
11:12
Lecture 39
39 analyzing important scripts code to inject
04:01
Lecture 40
40 practice challenge 23
01:30
Lecture 41
41 BlackListed Union and Select at challenge-solution-24
05:37
Lecture 42
42 WAF and parameter polution
45 slides
Section 4: Outro
Lecture 43
Outro
01:13

Instructor Biography
Mr. Hitesh Choudhary , Information Security Expert and Programmer

Trained as an Electronics Engineer and mastered as computer network and Information Security, Mr. Hitesh Choudhary is a renowned Author, video author, International speaker and security consultant. Also he is a got trained in wireless security from a prof. of MIT. He created various tools and attacks like wireless Eurynomus featured in pentest magazine and in Backtrack project. His webinar on wireless, Backtrack, and ethical hacking was attended by 2000+ professionals from Google India, HP, IBM, Accenture, TCS, Sapient Corp. , Symantec, EEL India Ltd., Capgemini, Micro Technology, CDAC, Kodak India Ltd., Wipro Infotech Ltd., ABB Ltd., Tech Mahindra Ltd., and many more. He is also an active consultant and speaker for police in India and Army Intelligence and his work was featured in 20+ air, print and live media.

If you want more than this brief info, join him at facebook or www.HiteshChoudhary.com

Sharing Widget


Download torrent
464.24 MB
seeders:0
leechers:11
SQL Injection Master Course by Hitesh ChoudHary