Тёмный

SQL Injection - Lab #14 Blind SQL injection with time delays and information retrieval 

Rana Khalil
Подписаться 82 тыс.
Просмотров 9 тыс.
50% 1

Опубликовано:

 

18 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 21   
@RanaKhalil101
@RanaKhalil101 3 года назад
Interested in supporting me and gaining early access to the Web Security Academy videos when they're recorded? Consider buying my course: academy.ranakhalil.com/p/web-security-academy-video-series! ✨ ✨
@HerbertEduardoFernandezTamayo
@HerbertEduardoFernandezTamayo 3 года назад
thanks a lot for the walkthrough, the entire series has been a blast!, I admire you: working until 2:30 am in the morning is just for experts!, amazing, seriously
@arenzovich
@arenzovich Год назад
Amazing work and tutorial series. Keep up the good work Rana. Just a quick point, for efficiency - at intrusion part - we could just check if length of password is = to the payload (in this case numbers 1~25) instead of > . This way only the exact length (20) will take 10sec. ...LENGTH(password)=§1§...
@abemendez2798
@abemendez2798 10 месяцев назад
Hello Rana, great stuff. Learnt alot about SQLi. I would like to see more videos on how to go about writing python scripts. Thanks.
@petergentile8974
@petergentile8974 2 года назад
thanks for all these tutorials, and scripting them
@jawahiral-jabarty2377
@jawahiral-jabarty2377 3 года назад
Thank you soooo much, you are a great and honest teacher. Regards
@abbassadeghi366
@abbassadeghi366 25 дней назад
tnx a lot professor i have one question when we use substr and when we use substring function in latest Labs somewhere we used substring like this example: ' and (select substring(password,1,1) from users where username='administrator')='a'-- and somewhere we used substr like this example: ' || (select CASE WHEN (1=1) THEN TO_CHAR(1/0) ELSE '' END FROM users where username='administrator' and substr(password,1,1)='a') || '
@elywacime5411
@elywacime5411 Год назад
thank you very much for these videos
@mahditabatabai9458
@mahditabatabai9458 2 года назад
ty rana .u are the best ❤️🙏
@hoangnguyenthai4524
@hoangnguyenthai4524 2 года назад
Thank you for the lesson, I have a question is it possible to find the table name by time delays and how to do it?
@NetDevsRyan
@NetDevsRyan 8 месяцев назад
I tried over and over again, and downloaded this Python script and used it, changed the TrackingId and session and URL to match my fresh session, and was not able to get this to work. the Python Script runs, but never retrieves a result. It just continues to cycle through the ASCII characters. I'm on Python 3.11.6 on OSX 14 Sonoma.
@NetDevsRyan
@NetDevsRyan 8 месяцев назад
I tried this again in the morning, with a fresh start, and the python script works. So it's not my python version, and I'm using the same code, the only difference I can see is that I added the /filter?category=Pets to the url.
@hilalkhan8446
@hilalkhan8446 3 месяца назад
If a web have no tracking Id............. is it mean that the web is not vulnerable to the blind sqli?
@fammilogga
@fammilogga Год назад
Any reason to use such a long sleep timer instead of using 2-3 seconds?
@888bam
@888bam Год назад
I set mine to 7800 seconds so that I have enough time to watch a movie between queries.
@nishantdalvi9470
@nishantdalvi9470 7 месяцев назад
​@@888bam 😂😂😂
@TheMsterDoctor1
@TheMsterDoctor1 Год назад
i dont know why but the python code dont work !!!
@NassimDhaher
@NassimDhaher 2 года назад
Great python codes. This one gave false positives. I had to rerun the script several times since I was getting non-alphanumeric characters.
@revenant9171
@revenant9171 Год назад
I increased the sleep timer to 15 and that fixed the false positives
@vandanbhuva6356
@vandanbhuva6356 Год назад
Is there a way to get the trackingid and session cookies using the script itself rather than having to add it manually? I tried using the r.cookies.get_dict() method but the cookies don't match with the ones opened in the lab probably because I'm sending another request to get the cookies.
Далее
Cross-Site Request Forgery (CSRF) | Complete Guide
48:11