Hacking

SQL Injection – Another hacking how-to

May 1, 2011 by Keatron Evans

We wanted to get up a brief demo of the ubiquitous SQL Injection. We use it here to get control of the OS. We’ll have a lot more angles on SQL Injection – as well as how to defend against the toughest and most creative of us.

Be sure to check out our ethical hacking course!

Posted: May 1, 2011
Articles Author
Keatron Evans
View Profile

Keatron Evans is regularly engaged in training, consulting, penetration testing and incident response for government, Fortune 50 and small businesses. In addition to being the lead author of the best-selling book, Chained Exploits: Advanced Hacking Attacks from Start to Finish, you will see Keatron on major news outlets such as CNN, Fox News and others on a regular basis as a featured analyst concerning cybersecurity events and issues. For years, Keatron has worked regularly as both an employee and consultant for several intelligence community organizations on breaches and offensive cybersecurity and attack development. Keatron also provides world-class training for the top training organizations in the industry, including Infosec Skills live boot camps and on-demand training.

Leave a Reply

Your email address will not be published. Required fields are marked *