Introduction
  • Course and author introduction
Getting Started
  • Setting up safe and legal environments to attack
  • Getting started with OWASP ZAP
  • Reviewing important SQL concepts
SQL Injection Attacks
  • SQL injections explained
  • Cheat sheets and references
  • Information gathering
  • SQL injection attacks by hand
  • Mounting an attack with SQLMap
Defenses Against SQL Injections
  • Defending the network layer
  • Defending the application layer
  • Defending the database layer
Conclusion and additional resources
  • Conclusion and additional resources