
SQL injection (SQLI) is considered one of the top 10 web application vulnerabilities of 2007 and 2010 by the Open Web Application Security Project.
In 2013, SQLI was rated the number one attack on the OWASP top ten.
1: SQL Injection – Simply Explained
A simple way to explain the basics of SQL injection through interpretive animation.
2: SQL Injection Explained
Watch this video tutorial to find out in simple terms what the SQL Injection vulnerability is, and how real threats result from this typical exploitation.
It features a sample exploitation scenario illustrating clear steps of what an attacker may do with a website which is vulnerable to error based SQL Injection.
3: SQL Injection Hacking #1
4: SQL Injection Hacking #2 – Order By
5: SQL Injection Hacking #3 – Union
6: SQL Injection Hacking #4 – Field Names
7: SQL Injection Hacking #5 – Database Name
8: SQL Injection Hacking #6 – Union Pt. II
9: SQL Injection Hacking #7 – Limit
10: SQL Injection Myths & Fallacies: Best Practices of Defense
Instructor: Various