SQL Injection 101 Course
**Contact GalaxyNinja to purchase this course***SQL Injection (SQLi) has been a common and popular web attack method for many hackers since the early 2000′s. It was estimated recently that 70 percent of the internet is still vulnerable to this type of attack. It is primarily used to compromise databases which contain usernames, passwords, credit card and other sensitive information. It is because of these attacks, that thousands and thousands of internet users have had their email accounts hacked, become victims of identity theft, and more. These attacks have gained popularity in recent years due to the activities of hacker groups such as “Anonymous”, “Lulz Sec”, and others. To see the latest wiki report, click here. Top-Hat-Sec decided to release its own course in learning some of the skills preformed in SQL injection attacks. There are hundreds of techniques however this course outlines what Top-Hat-Sec believes to be the best and most effective way to preform SQL Injection. SQL Injection can be patched. Not every website, or database will be vulnerable. The purpose of this course shows how these vulnerabilities are attacked. Any network administrator or database admin should be educated in this area. Top-Hat-Sec believes that if an individual or company is going to store information in a database, especially when the database contains sensitive information, it is the duty of that individual or company to protect that information from black-hat hackers. This course does not focus on how to patch these vulnerabilities. This is done through script filtering and should be handled by an experienced developer and/or administrator familiar with SQL injection patching. Each database is different, therefore the filter used will most probably need to be customized for the particular needs of the database or website.
Print out, sign and date and either scan or take a picture of the 2nd form and email both forms back. These are legally binding documents.