Interested in supporting me and gaining early access to the Web Security Academy videos when they're recorded? Consider buying my course: academy.ranakhalil.com/p/web-security-academy-video-series! ✨ ✨
hi , you really did a great job, i can't imagen that is there someone in the world can give this massive amount of information about specific vulnerability, since you did it with the manual way , can you give one last lesson using an automated tool such as sql-map ?
I guess that the # symbol is being interpreted as an anchor symbol. Like when you use and then it jumps to element that has the id attribute of "some_title" 🤔 Amazing course by the way! Top notch quality 👌
This is the first time i saw ur video by youtube recommendation, ur explanation and detailed view are awesome friend. i have always question y and what ? i found out my answers when i saw ur video. Thank you so much friend.
It a matter of encoding special characters. If you are entering //' order by 1# // directly into address bar of your browser, use %23 instead of #. Or use Burp. Burp will encode # itself.