© Sanjib Sinha 2018
Sanjib SinhaBeginning Ethical Hacking with Kali Linuxhttps://doi.org/10.1007/978-1-4842-3891-2_9

9. SQL Mapping

Sanjib Sinha1 
(1)
Howrah, West Bengal, India
 

In this chapter, you will take a detailed look at how you can avoid being hacked by a sniffer; in addition, you will learn how you can exploit SQL injection flaws and take over database servers. Crackers break into systems by injecting malformed SQL queries that map out the database column names. This is known as SQL mapping , with SQL injection being the technique by which they obtain this information. When you have a good grasp of SQL mapping, you can defend your system from such attacks.

There are a few good sniffing tools available in Kali Linux. You can also build your ...

Get Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.