Summary

In this chapter, we learned how to enumerate the table names from the database using SQL injection, and we also learned how to read files from the OS file system via SQL injection.

Remember to review the tools, such as SQL map or SQL brute, to learn more about how these tools work.

In Chapter 7, Intercepting HTTP Requestswe're going to learn about HTTP proxies, and we're going to create our own based on the mitmproxy tool.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.19.30.232