Advanced SQL Injection Attack — TryHackMe Walkthrough
TryHackMe's Web App PenTest -- Advanced SQL Injection: https://tryhackme.com/room/advancedsqlinjection 00:00 Introduction to SQL Injection 00:21 Types of SQ...

In Phu Sec Lab
1.0K views • Apr 26, 2025

About this video
TryHackMe's Web App PenTest -- Advanced SQL Injection:
https://tryhackme.com/room/advancedsqlinjection
00:00 Introduction to SQL Injection
00:21 Types of SQL Injection
00:41 In-band SQL Injection Techniques
01:10 Inferential SQL Injection Techniques
02:10 Out-of-band SQL Injection Techniques
03:52 Second Order SQL Injection
04:58 Practical Example: Book Review Application
06:40 Backend Code Analysis
17:59 Filter Evasion Techniques
18:45 Character Encoding Methods
39:03 No Code SQL Injection Techniques
49:19 Introduction to SQL Injection Bypass Techniques
49:52 Case Manipulation and Inline Comments
50:17 Alternate White Spaces and Logical Operators
50:52 Obfuscation and Encoding Techniques
51:25 Real-World Pen Testing Considerations
52:16 Out of Band SQL Injection Explained
55:43 Database-Specific Out of Band Techniques
01:01:13 Practical Example: Exfiltrating Data
01:11:32 Advanced SQL Injection Techniques
01:28:26 Automation Tools for SQL Injection
01:32:04 Best Practices and Mitigation Measures
01:40:28 Conclusion and Final Thoughts
https://tryhackme.com/room/advancedsqlinjection
00:00 Introduction to SQL Injection
00:21 Types of SQL Injection
00:41 In-band SQL Injection Techniques
01:10 Inferential SQL Injection Techniques
02:10 Out-of-band SQL Injection Techniques
03:52 Second Order SQL Injection
04:58 Practical Example: Book Review Application
06:40 Backend Code Analysis
17:59 Filter Evasion Techniques
18:45 Character Encoding Methods
39:03 No Code SQL Injection Techniques
49:19 Introduction to SQL Injection Bypass Techniques
49:52 Case Manipulation and Inline Comments
50:17 Alternate White Spaces and Logical Operators
50:52 Obfuscation and Encoding Techniques
51:25 Real-World Pen Testing Considerations
52:16 Out of Band SQL Injection Explained
55:43 Database-Specific Out of Band Techniques
01:01:13 Practical Example: Exfiltrating Data
01:11:32 Advanced SQL Injection Techniques
01:28:26 Automation Tools for SQL Injection
01:32:04 Best Practices and Mitigation Measures
01:40:28 Conclusion and Final Thoughts
Video Information
Views
1.0K
Likes
9
Duration
01:42:43
Published
Apr 26, 2025
User Reviews
4.1
(1) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.