Completed
SQL Injection Example 2
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
SQL Security Revisited
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Presentation Outline
- 3 Presence
- 4 Security Framework
- 5 Net Libraries
- 6 SQL Server Service Context
- 7 SQL Server Security Modes (cont.)
- 8 Good Idea - What's the problem? • Microsoft recommends Windows Authentication Mode
- 9 Mode Guidelines
- 10 SQL Server Roles
- 11 C2 Level Auditing
- 12 Some Other SQL 2K Goodies
- 13 The Bad
- 14 Target Acquisition
- 15 Newsgroups
- 16 SQL Scanning
- 17 Broadcast Discovery
- 18 SQL Server Discovery
- 19 SQL Ping Utility
- 20 Account Acquisition (cont.)
- 21 Source Code Disclosure
- 22 Privilege Escalation (cont.)
- 23 Other Potential Pitfalls
- 24 They're in - Now What?
- 25 Your Defenses
- 26 Section 2 Conclusion
- 27 The Ugly
- 28 Scope of SQL Injection
- 29 SQL Injection Example 2
- 30 Live Demonstration
- 31 SQL Injection Samples
- 32 SQL Injection - Tricks