Тёмный

SQL Injection - Lab #13 Blind SQL injection with time delays 

Rana Khalil
Подписаться 82 тыс.
Просмотров 20 тыс.
50% 1

Опубликовано:

 

19 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 28   
@RanaKhalil101
@RanaKhalil101 3 года назад
Interested in supporting me and gaining early access to the Web Security Academy videos when they're recorded? Consider buying my course: academy.ranakhalil.com/p/web-security-academy-video-series! ✨ ✨
@hermajaystey
@hermajaystey Год назад
I am binging this whole series thank you for being an amazing explainer. As soon as I can afford it I am going to pay for your video series to show support to you. THANK YOU
@WILLIAMANDREYCHACONBALLESTERO
@WILLIAMANDREYCHACONBALLESTERO 6 месяцев назад
thank you so much, this was so helpful! greeting from Costa Rica.
@mustaquemsheikh572
@mustaquemsheikh572 3 года назад
Very nicely explained sister
@truongsonnguyen144
@truongsonnguyen144 6 дней назад
i have 2 questions 1. with concat string, when you consider with mysql, why did u using || instead of space? (in cheatsheet they're using space) 2. in a query: seclect tracking-id.... why did it end with ' ? can u explain, thank you so much!
@TriNguyen-dl9uu
@TriNguyen-dl9uu 3 года назад
wonderful explanation, I had my aha moments in this video. Keep up the good work
@acronproject
@acronproject Год назад
Thank you Ms.Khalil
@duylt5_letrongduy743
@duylt5_letrongduy743 Год назад
Why don't you try using AND or anything else but use || first?
@shba9300
@shba9300 Год назад
does it work with AND? because I tried but no results
@neadlead2621
@neadlead2621 Год назад
@@shba9300 an and need a condition after it because the query is something like SELECT X FROM Y WHERE Z='xxxxxx' so if we add AND we need a condition having sleep after it will not have any sencce and it will result a syntax error and in this case we can't see the result of a syntax error
@ererekam
@ererekam Год назад
AND needs boolean, so it doesn't work. But batched queries will also work: '%3B select pg_sleep(10)--
@betulbuyukalimm
@betulbuyukalimm 8 месяцев назад
AND also works: ' AND 1=(SELECT 1 FROM pg_sleep(10))--
@hibohi
@hibohi 2 года назад
Thank you Rana for the amazing guide. Could you please clarify why we need to add the concatenate || in the query? I'm still unclear about this.
@ahmedsaleem9327
@ahmedsaleem9327 2 года назад
i have the same question why should not it work with AND ?
@neadlead2621
@neadlead2621 Год назад
@@ahmedsaleem9327 an and need a condition after it because the query is something like SELECT X FROM Y WHERE Z='xxxxxx' so if we add AND we need a condition having sleep after it will not have any sencce and it will result a syntax error
@Amit-fn7bw
@Amit-fn7bw Год назад
@@ahmedsaleem9327 SAME DOUBTS , if you get the answer please mentained it here.
@hafsaakhter3261
@hafsaakhter3261 7 месяцев назад
Hi I have a question.. In some videos you use '||' this operator and in some you use 'and'.. Can u explain that
@落珰
@落珰 Год назад
Thank you, I will follow you in every video
@落珰
@落珰 Год назад
我也是
@alexandro6033
@alexandro6033 2 года назад
thank you♥♥ but in 6:46 the payload for mysql the comment is //%20 or # Thanks again
@lowprivuser2460
@lowprivuser2460 3 года назад
In this tutorial why did on providing single quote on tracking cookie did not throw internal error? , if so how will we know that the parameter is vulnerable to sql injection
@camelotenglishtuition6394
@camelotenglishtuition6394 2 года назад
I know it's a late reply but perhaps as you're giving 2 instructions. 1 for the timing delay and the other for length of time? This seems to be logical to me as || is used to join strings / commands.
@samamirparviz6279
@samamirparviz6279 2 года назад
@@camelotenglishtuition6394 its not true , its because the application catches database errors and handles them gracefully.
@danielklibanov5797
@danielklibanov5797 Год назад
Dont know if this video is alive and someone replying but I think it was best that if you explaining the xploit part by part, it best to also explain why did you use || to concatenate, I have no idea what made you want to put that, and its ashame cause SQLi is all about logic
@amiremami8661
@amiremami8661 Год назад
This was exactly my question. Why we used || ? The original code is SELECT pg_sleep(10) , how transformed to || (SELECT pg_sleep(10)) ?
@z3nsh3ll
@z3nsh3ll 6 месяцев назад
@@amiremami8661@danielklibanov5797 It seems like the decision to use || was incorrect for a mysql back end since mysql uses CONCAT() for concatenation. || was used since it is the concatenation operator for postrgresql DB which is what is running on the back end for this lab. (If a function is concatenated it is executed as part of the concatenation, hence causing the DB to sleep). However, if all sleep payloads were to be tried as implied in the vid, it would be incorrect to use || as the concatenation operator for all of them. Fwiw, mysql can be configured to use || as a concatenation operator, but there is no way the attacker should assume that it's configured that way.
@amiremami8661
@amiremami8661 6 месяцев назад
@@z3nsh3ll Hey, thank you so much man ❤ , I'm already following you, one of the best channels that explain things deeply 🙏
Далее
Hacking Websites with SQL Injection - Computerphile
8:59
SQL Injection Beginner Crash Course
30:00
Просмотров 60 тыс.
Weird URL Protocols
13:54
Просмотров 429 тыс.