SQL Injection attacks are still considered a very real threat. Everything talks across the networks in the same manner and being able to recognize that communication within a packet capture will set you above most IT Security Analyst. It does not matter what the operating system is or the brand of the computer. Learning to use Wireshark for analysis and threat hunting is one of the most important items to add to your arsenal. You will be looking for any evidence of the SQL Injection attack possibly working. The next step will be to save off the information from the packet capture into a. You will then follow the TCP Stream and review the entire request and response cycle. In the CYBRScore Analyze SQL Injection Attack lab, you will begin by analyzing a network packet capture and looking for evidence of an attempted SQL Injection attack.
0 Comments
Leave a Reply. |