Analyze SQL Injection Attack

Students will Identify the use of an SQL Injection through the use of Wireshark. The students will also isolate the different aspects of the SQL Injection and execute the selected code.

Overview

Students will Identify the use of an SQL Injection through the use of Wireshark. The students will also isolate the different aspects of the SQL Injection and execute the selected code.

Learning Partner
CYBRScore
CYBRScore
Cybersecurity Technical Hands-on Labs