This chapter will provide a better understanding of structured query language (SQL) injections and vulnerabilities. The topics covered will include:
- Learning what hashes are
- How they function within a network
- Defining SMB
- How it operates within a network
- Learning what an SQL injection is
- How it is used by attackers
- Examples of SQL injection methods
- Learning the basic website vulnerabilities involving injection attacks
- Defense techniques against SQL injection attacks
In the labs we provide, you will be using Metasploit to pass the hash of a Windows login credential. We will also talk about how a web server databases work and why hackers use SQL injection to steal data from them. This chapter will explore a new type of attack vector that hackers often use to steal credentials from web-server's databases. This chapter will highlight many of the most common SQL vulnerabilities that are exploited...