Overview
Students will Identify the use of an SQL Injection through the use of Wireshark. The students will also isolate the different aspects of the SQL Injection and execute the selected code.
Learning Partner
CYBRScore
Cybersecurity Technical Hands-on Labs