Guessing

Difficulty: Intermediate
Duration: 6 minutes and 4 seconds
Students: 74
Rating: 3/5

About

This lesson focuses on SQL vulnerabilities which are some of the most common and dangerous vulnerabilities that you will come across when you carry out web pentesting or bug bounty hunting. We'll start by covering the fundamentals of SQL and how a database is created using it. You'll also learn about SQL comments to insert values, get their values back or change them, delete them, or edit them.

Covered Topics
Lecture UUID
Course UUID