If you can see this check that
Authors: Rich Macfarlane, Gordon Russell
Aim: To investigate SQL Injection testing/attack methods, firstly following a manual SQLi testing methodology, and then using SQLi tools from the Kali Linux platform to automate similar testing methods. Try to create a file to document each working SQLi statement/URL as you work thorough each question. Build on each working SQLi keeping the previous working statements to go back to. Attempting to guess the SQL SELECT statement the web app scripts are using can also be useful. These can be improved as more databas/schema table and column enumeration is completed.To reset all the check buttons from a previous attempt click here
Having a disaster
| Centos 7 intro | Paths | BasicShell | Search |
| Linux tutorials | intro1 | intro2 | wildcard | permission | pipe | vi | essential | admin | net | SELinux1 | SELinux2 | fwall | DNS | diag | Apache1 | Apache2 | log | Mail |
| Caine 10.0 | Essentials | Basic | Search | Acquisition | SysIntro | grep | MBR | GPT | FAT | NTFS | FRMeta | FRTools | Browser | Mock Exam |
| Caine 13.0 | Essentials | Basic | Search | |
| Kali 2020-4 | 1a | 1b | 1c | 2 | 3 | 4a | 4b | 5 | 6 | 7 | 8a | 8b | 9 | 10 |
| Kali 2024-4 | 1a | 1b | 1c | 2 | 3 | 4a | 4b | 5 | 6 | 7 | 8a | 8b | 9 | 10 |
| Useful | Privacy Policy | Terms and Conditions |
Linuxzoo created by Gordon Russell.
@ Copyright 2004-2026 Edinburgh Napier University