Skip to main contentSkip to main content
Room Banner
Room Icon

Sequel Dump

Premium room

Can you decipher the captured traffic of an SQL Injection attack?

hard

90 min

854

User profile photo.
User profile photo.
User profile photo.

To access material, start machines and answer questions login.

The Sequel Dump room is only available for premium users

Ready to learn further?

The remaining tasks guide you through the full hands-on experience to mastering the concept.

Continue Learning on Premium

🔒Secure payment • Cancel anytime

Ready to learn Cyber Security?

The Sequel Dump room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.