Тёмный

SQL Injections are scary!! (hacking tutorial for beginners) 

NetworkChuck
Подписаться 4 млн
Просмотров 1,5 млн
50% 1

Is your password for sale on the Dark Web? Find out now with Dashlane: www.dashlane.com/networkchuck50 (Use code networkchuck50 to get 50% off)
In this video, we’re learning one of the oldest, yet most dangerous Hacking Techniques out there, SQL Injection. Despite SQL Injections being over 20 years old, they still rank number 3 on the OWASP Top 10 List….why? Even fortune 500 companies are still vulnerable to these attacks!! So, in this video, NetworkChuck will show you how to run an SQL Injection attack. Running a basic SQL Injection attack is pretty easy but will often become more complex with trickier targets.
Stuff from the Video
---------------------------------------------------
TARGET SITE (Altoro Mutual): demo.testfire.net/index.jsp
MORE practice: play.picoctf.org/practice/cha...
How to protect against SQL Injection attacks: www.crowdstrike.com/cybersecu...
🔥🔥Join Hackwell Academy: ntck.co/NCAcademy
**Sponsored by Dashlane
SUPPORT NETWORKCHUCK
---------------------------------------------------
➡️NetworkChuck membership: ntck.co/Premium
☕☕ COFFEE and MERCH: ntck.co/coffee
Check out my new channel: ntck.co/ncclips
🆘🆘NEED HELP?? Join the Discord Server: / discord
STUDY WITH ME on Twitch: bit.ly/nc_twitch
READY TO LEARN??
---------------------------------------------------
-Learn Python: bit.ly/3rzZjzz
-Get your CCNA: bit.ly/nc-ccna
FOLLOW ME EVERYWHERE
---------------------------------------------------
Instagram: / networkchuck
Twitter: / networkchuck
Facebook: / networkchuck
Join the Discord server: bit.ly/nc-discord
0:00 ⏩ Intro
0:39 ⏩ Sponsor - Dashlane
1:43 ⏩ How Websites work with Databases
2:08 ⏩ What is a SQL Injection??
2:51 ⏩ Strings in SQL Queries
3:25 ⏩ Is a website vulnerable to SQL Injection?
4:14 ⏩ SQL Query Logic
4:45 ⏩ the OR SQL Injection Payload
7:13 ⏩ the COMMENT SQL Injection Payload
8:42 ⏩ how to protect against SQL Injections
AFFILIATES & REFERRALS
---------------------------------------------------
(GEAR I USE...STUFF I RECOMMEND)
My network gear: geni.us/L6wyIUj
Amazon Affiliate Store: www.amazon.com/shop/networkchuck
Buy a Raspberry Pi: geni.us/aBeqAL
Do you want to know how I draw on the screen?? Go to ntck.co/EpicPen and use code NetworkChuck to get 20% off!!
#sqlinjection #owasptop10 #sqli

Наука

Опубликовано:

 

18 июн 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 2,3 тыс.   
@NetworkChuck
@NetworkChuck Год назад
Is your password for sale on the Dark Web? Find out now with Dashlane: www.dashlane.com/networkchuck50 (Use code networkchuck50 to get 50% off) Stuff from the Video ------------------------------------------------- TARGET SITE (Altoro Mutual): demo.testfire.net/index.jsp MORE practice: play.picoctf.org/practice/cha... How to protect against SQL Injection attacks: www.crowdstrike.com/cybersecu... 🔥🔥Join Hackwell Academy: ntck.co/NCAcademy 0:00 ⏩ Intro 0:39 ⏩ Sponsor - Dashlane 1:43 ⏩ How Websites work with Databases 2:08 ⏩ What is a SQL Injection?? 2:51 ⏩ Strings in SQL Queries 3:25 ⏩ Is a website vulnerable to SQL Injection? 4:14 ⏩ SQL Query Logic 4:45 ⏩ the OR SQL Injection Payload 7:13 ⏩ the COMMENT SQL Injection Payload 8:42 ⏩ how to protect against SQL Injections
@notthatbad8844
@notthatbad8844 Год назад
Cool
@saikota27
@saikota27 Год назад
admin' OR '1' = '1 IM IN👿
@xeonzero1
@xeonzero1 Год назад
that's spam
@notthatbad8844
@notthatbad8844 Год назад
@@saikota27 lol
@ShaneWelcher
@ShaneWelcher Год назад
Logged into your test website with ease after watching this video. I am going to use this video has a best practice for how to program better to limit possible attacks that are this simple. I used: admin'-- Password123 You have to enter in a password even if it is wrong...that is part of the form.
@mithunparmar382
@mithunparmar382 3 дня назад
As a Maldivian living in the UK, I despise these scammers. It warms my heart to see efforts like Adrian Ruthnik's. Keep up the excellent work.
@jayaghute-zz3vw
@jayaghute-zz3vw 3 дня назад
Congratulations on your efforts to combat scammers, Adrian Ruthnik. Protecting the public from fraudsters is a noble endeavor, and your work deserves high praise.
@PRAVEENKUMAR-bl7cg
@PRAVEENKUMAR-bl7cg 3 дня назад
The video tutorial kept glitching on me, but thank you for it. Also, thank you, Adrian Ruthnik. Meeting you was a blessing in disguise. Keep up the good work; many people will need your help in the future.
@ajaysidar7492
@ajaysidar7492 3 дня назад
The efficiency of Adrian Ruthnik is next level. Managing walkthroughs from various angles with such clarity is remarkable. Making complex topics easy to understand is really something. Awesome work!
@shepherdmhlanga1659
@shepherdmhlanga1659 Год назад
I know the website was made vulnarable on purpose but I feel like a legend right now 😂
@NetworkChuck
@NetworkChuck Год назад
Same.
@Jordan-vz7kt
@Jordan-vz7kt Год назад
@@NetworkChuck I did it. This is so cool. How do you do this with other websites that isn't vulnerable.
@hardscope7744
@hardscope7744 Год назад
@@Jordan-vz7kt he won’t tell you that it’s not legal bro
@hardscope7744
@hardscope7744 Год назад
@@Jordan-vz7kt he won’t tell you that it’s not legal bro
@scott32714keiser
@scott32714keiser Год назад
Still fun
@ProGamer-oi4pk
@ProGamer-oi4pk 3 дня назад
Adrian Ruthnik, your clarity in explaining complex topics and managing multiple aspects of the process is truly exceptional. Your work is nothing short of outstanding.
@autrypickens1736
@autrypickens1736 Год назад
When I started watching your videos I was a security guard making about $13/hr. Last year I became the lead help desk tech at my community hospital and made over $60k. I only have some community college credits and the A+ cert. IT has changed my life!! I highly recommend this field. Now I'm working on the Sec+ and getting ready for Tier 2 opportunities. Thank you for the inspiration over the years! cheers ☕
@sanicspeed1672
@sanicspeed1672 4 месяца назад
How much did you make per year when you worked 13/hr?
@tempoclasse2907
@tempoclasse2907 3 месяца назад
I can't tell if this is a automated bot response you would find under chucks videos or someone Givin their real life testament.
@Anifix123
@Anifix123 3 месяца назад
Bro I wud have made $112 , 220 if u got $13/hr u clearly scammed urself or u meant to say $13/day
@guyfromhesse-hannau6625
@guyfromhesse-hannau6625 2 месяца назад
​@@Anifix123 One man can't possibly keep guard 24/7 for an entire year can he?
@TimeForTechAarush
@TimeForTechAarush 2 месяца назад
A true legend
@methanesulfonic
@methanesulfonic Год назад
That visual on the sql query REALLY helped me understand these concept. I cant thank you enough for this
@nFire
@nFire Год назад
As a computer science engineer I really thank you for your work here on youtube. Your ability to make people understand cyber security is unique, passionate and wonderful. Thank you from the bottom of my heart. - An 🇮🇹 engineer
@lleonix
@lleonix Год назад
yee ciao dani!! ingegnere di fiducia
@antonioroldi451
@antonioroldi451 Год назад
Ma guarda chi si vede
@MK-D-O
@MK-D-O Год назад
Nope, not "an it engineer", just say nFire, it's self explanatory! (btw you should talk about it too)
@MK-D-O
@MK-D-O Год назад
@@antonioroldi451 proprio quello che ho pensato
@ekieinvento4871
@ekieinvento4871 Год назад
Hello sir. Can you hack my gmail acc? I forgot the password. The number is not available also.
@jiminietimber
@jiminietimber Год назад
We just covered this in class. This was explained SO WELL.
@zaccampa4055
@zaccampa4055 Год назад
He does explain it way better than most professors for sure.
@sourabhsingh5051
@sourabhsingh5051 Год назад
Hey buddy I want to learn hacking Which class Plzz enlighten me
@vaniad555
@vaniad555 Год назад
@@sourabhsingh5051 hackthebox
@tommyshelby6277
@tommyshelby6277 Год назад
@@sourabhsingh5051 get a computer science degree bro, it covers it all
@sourabhsingh5051
@sourabhsingh5051 Год назад
@@tommyshelby6277 to bad I'm in med school
@tiqo8549
@tiqo8549 Год назад
I've built a ton of login systems with php/sql. I had to learn the hard way that it was not so easy. You explained it in a way that just take 10 minutes of a starting backend programmer to review his code. There are plenty of ways to prevent this all from happening..you just have to know where to start. Thank you for the explanation!
@sukyamum1117
@sukyamum1117 Год назад
*hacker sniper50 official page* *I have noticed how punctual you’ve lately keep up the good work* 🇺🇸🇺🇸🇺🇸🇺🇸🇺🇸🇺🇸
@ChrisRid
@ChrisRid Год назад
I loved that demo, what an awesome idea and a great way for people to get involved and try things out in a safe and responsible way. Made me smile :)
@TwilightWolf285
@TwilightWolf285 Год назад
For the bonus question, it is possible to login without knowing the username by using the following input: ' or 1=1-- This query returns the first user in the database as validation for the username field, because 1 does in fact equal 1, while ignoring the request for a password due to the comment at the end.
@ThisGuy....
@ThisGuy.... Год назад
is this because the 1 in the query without '' references position in table instead of String? tried it with the '' but wouldnt work...
@keeganhenderson24
@keeganhenderson24 Год назад
What if the site doesn’t allow you to enter special characters like “ ‘ =
@grantcapel9884
@grantcapel9884 Год назад
@@keeganhenderson24 then they are safe against this sql injection. Most sites are, but if you find a crappy self-coded one, you may be able to get in
@ibockie9633
@ibockie9633 Год назад
@@keeganhenderson24 thats why most sites dont allow u to bc of that reason
@developer_hadi
@developer_hadi Год назад
@@keeganhenderson24 If they don't allow that on the serverside then they're safe, but if they don't allow that only on the frontend and they're using something like node js, you can get the url of the endpoint they are sending the request to, and then you send a request to that url and tadaaaa 🎉
@GilesMurphy
@GilesMurphy Год назад
As usual, your videos are insightful and accurate. I have always struggled to explain this to people, but now I will just send them to your video. I was able to log in to your target sight by the way.
@VictorSamson-ds8xy
@VictorSamson-ds8xy 7 месяцев назад
One of the reasons I love this guy's work. Explains everything so well and still gives us a site to practice on
@ra4okdev29
@ra4okdev29 Год назад
This video was such a cool one, man! You explained all of this stuff SO WELL
@TimberWolfCLT
@TimberWolfCLT Год назад
I love the way that you explained this. I'm retired now but was a software engineer and was always getting the "deer in the headlights" look from other developers when I'd warn about SQL injection.
@modables
@modables Год назад
stop working with deer first of all
@ancestrall794
@ancestrall794 Год назад
It's really nice that you offer a lab for people to practise, it really feels rewarding to achieve it even if this is just the basics of SQL injections, it's satisfying (+ apparently the website told me I received 80000$ so i'm pretty confortable right now)
@weaver4usmc
@weaver4usmc Год назад
Thank you so much for the content that you put out, you have launched me into a passion for cybersecurity. All of your videos are helping the community out in a positive way.
@ridhambhagat2483
@ridhambhagat2483 3 дня назад
Your approach to problem-solving is both innovative and effective. The solutions you provided were not only practical but also tailored to my specific needs. This personalized attention sets you apart from others in your field. Thank you, Adrian Ruthnik, for your thoughtful and comprehensive support.
@stemgerlamo599
@stemgerlamo599 Год назад
Chuck you are killing it, thanks for sharing and we really appreciate the way you helping
@cyberdevil657
@cyberdevil657 Год назад
I love all of these videos!
@TheJeromemarkwick
@TheJeromemarkwick 4 месяца назад
Fantastic and entertaining demonstration of how SQL Injection works. This can be very difficult to understand, but you have made it very easy. I love your videos. Keep up the good work!
@jonahhorstmann
@jonahhorstmann Год назад
One of the things that I use when coding an OS login system, is having the client send the Username and Password string to a server, and having the server lookup the Username string's ID and then going into a datastore with the key of the UsernameID and pairing it with the password string stored. This prevents attacks because it doesn't use Usernames to get the password pair, it has to lookup the string and find an ID in order for it to find a pair.
@lilybohr
@lilybohr Год назад
As a computer science student all of your videos have been really helpful. But this one came just at the right time cause im doing a database class right now and learning about SQL.
@sebastian.-.5043
@sebastian.-.5043 Год назад
Me too broski
@nagato6819
@nagato6819 Год назад
I think you don't need to worry too much about that. I think these problems were detected before 2004 because in 2004 the prepared statements showed up. after that, from version 5.3.0 executing multiple queries in a single statement was disallowed by default and gave you an error.
@sukyamum1117
@sukyamum1117 Год назад
*hacker sniper50 official page* *I have noticed how punctual you’ve lately keep up the good work* 🇺🇸🇺🇸🇺🇸🇺🇸🇺🇸🇺🇸
@garylove2836
@garylove2836 12 дней назад
I use to see this syntax error message in my 1987Hewlett-Packard computer I bought more than 37 years ago.
@jcbenge08
@jcbenge08 Год назад
OK SQL Injection attacks have eluded my understanding for so long, but the way you explained it in this video made SO MUCH SENSE and I was able to crack into that site on the 2nd try!!!! You are awesome Chuck, thank you for what you do!!!
@qasimalishahvlog
@qasimalishahvlog Год назад
Can you help me?
@justtavi1238
@justtavi1238 Год назад
@@qasimalishahvlog username: admin'-- password: anything
@sukyamum1117
@sukyamum1117 Год назад
*hacker sniper50 official page* *I have noticed how punctual you’ve lately keep up the good work* 🇺🇸🇺🇸🇺🇸🇺🇸🇺🇸🇺🇸
@stevecochrane9531
@stevecochrane9531 11 месяцев назад
Thx! As a programmer, I usually escape quotes and other characters. Essentially, when a user adds a quote, in the username or password field, it is removed before the query is run. Using NoSQL databases can help prevent SQL injections, too.
@nandalswanz
@nandalswanz 5 месяцев назад
im a total noob at any programming, but found it really easy to get into js and html, css etc. all this hacking stuff is so foreign to me so i really appreciate the breakdown you give in your vids!! i done the login thingy, so satisfying getting in LOL !
@shubhampatel6908
@shubhampatel6908 Год назад
Thanks for another amazing video Chuck. By the way I found, Altoro-mutual is also vulnerable for a cross-site scripting attack(XSS), probably you can make next video about it 😁
@hawanyamomahmath1489
@hawanyamomahmath1489 Год назад
how exactly did you do the xss attack?
@shubhampatel6908
@shubhampatel6908 Год назад
@@hawanyamomahmath1489 inject HTML in any form
@thekeyboardwarrior1018
@thekeyboardwarrior1018 Год назад
@@shubhampatel6908 so, if I add HTML code that gets every user into the inputs does it work?
@shubhampatel6908
@shubhampatel6908 Год назад
@@thekeyboardwarrior1018 I didn't understand your query clearly, can you elaborate pls
@thekeyboardwarrior1018
@thekeyboardwarrior1018 Год назад
@@shubhampatel6908 I meant if I put in html code that returns all user accounts and their passwords will it work? Or do I have to make it a web request
@AC-pr2si
@AC-pr2si Год назад
Chuck You are a great teacher.Thank you man.I hope that you will make more videos like this one in the future
@budstar9288
@budstar9288 Год назад
Awesome demonstration! Pivoting into IT right now and can't wait to learn more stuff like this
@BrennerEraFan
@BrennerEraFan Год назад
The intro is amazing!!! I like how Chuck turns his head and the anonymous mask just stares into the camera :)!!!
@lazoblazo
@lazoblazo Год назад
literally what i asked for. thanks chuck. you are good youtuber btw
@mrmovas
@mrmovas Год назад
I really found this video very interesting! It would be awesome if you could make more videos about SQL injections because it helps us know all the cases where we need to secure our queries.
@Shaggidelic69
@Shaggidelic69 Год назад
what do you do if you don't know the sites username???
@joshuab113
@joshuab113 Год назад
Does the websites see that they got SQL injected?
@sukyamum1117
@sukyamum1117 Год назад
*hacker sniper50 official page* *I have noticed how punctual you’ve lately keep up the good work* 🇺🇸🇺🇸🇺🇸🇺🇸🇺🇸🇺🇸
@isaacjames4114
@isaacjames4114 5 месяцев назад
i learnt all about Sql injection years ago but this video today made the penny drop and i got into that website really easy, you explained in such a way that is so easy to understand. thank you so much network chuck
@tekamSangma
@tekamSangma 3 дня назад
It's amazing what you do, Adrian Ruthnik. We need more people with your skills and good intentions. Thank you for sharing, Jon.
@CoronaBorealis02
@CoronaBorealis02 Год назад
just started a bachelors degree in computer networking thanks to you, keep up the great videos
@aryandeshpande1241
@aryandeshpande1241 Год назад
Good luck with thag
@ricardosarapura9479
@ricardosarapura9479 Год назад
So cute… but you never try be a developer?
@saifullahiahmedshuaibu3741
@saifullahiahmedshuaibu3741 Год назад
The way you explain IT stuff is breathtaking
@damonphagan5924
@damonphagan5924 Год назад
Got it first try!! Thanks for the awesome work you do on here! I've been soaking up knowledge from your videos all day and have learned so much!
@bob-nz6wj
@bob-nz6wj Год назад
What did you use?
@FallenxEmersed
@FallenxEmersed 2 месяца назад
I was able to do both the OR and Comment payloads. Love your explanations and demo! Rock on. Sub'd! -8 years in Cybersec
@jenkinspcrepair
@jenkinspcrepair Год назад
I was able to login as admin with the double dash technique. I had to create php/sql login scripts before trying to prevent injection hacks and this just gave a fantastic overview of the actual problem. Thanks Chuck great job 👍
@BusinessWolf1
@BusinessWolf1 Год назад
isn't it just a case of using template string for input?
@Shaggidelic69
@Shaggidelic69 Год назад
what do you do if you don't know the sites username???
@sukyamum1117
@sukyamum1117 Год назад
*hacker sniper50 official page* *I have noticed how punctual you’ve lately keep up the good work* 🇺🇸🇺🇸🇺🇸🇺🇸🇺🇸🇺🇸
@mordecai7030
@mordecai7030 7 месяцев назад
How??
@tmak4699
@tmak4699 Год назад
ive watched a lot of your videos..this one got my attention..i dont care that the method is old...but now i see the power
@lucascecconi258
@lucascecconi258 4 месяца назад
THANK YOU!! i was seeing a loyt of videos explaining how to avoid sql injection but not one explaining how to actually inject it (which is important to know how to avoid it). thanks a lot for the great explanation
@VertyDaGenius
@VertyDaGenius Год назад
u make it seem super easy and explain it so well! ur the best!
@wolfrevokcats7890
@wolfrevokcats7890 Год назад
Please, I would love to see more complex SQL injection techniques Chuck. Did I tell you[re a very good teacher? Kudos Network Chuck`
@theplant4046
@theplant4046 Год назад
If you like SQL injection but you too lazy to memorize over 100 type of injection codes (there is alot of injections because there is alot of type SQL languages example MySQL/postgreSQL/LiteSQL/etc) just learn how to use *SQL map* tool built-in Kali Linux and Parrotsec OS If you don't know SQL map will brute force every SQL code
@ranglyscosta4067
@ranglyscosta4067 Год назад
@@theplant4046 voce poderia me ajudar, estou um duvida
@jasonboard5504
@jasonboard5504 Год назад
First try, Now to check all of my internal servers and sites, but first I have to refill my coffee. Thanks for always making great videos!!
@daviad9832
@daviad9832 10 месяцев назад
it was fun, thanks. Been going through a bunch of security bugs at work. It's cool to see the stories I am going through are very justifiable.
@lecontaminent6012
@lecontaminent6012 Год назад
Tbh this guy's the most effective and chill teacher I've ever had definitely subbed
@marienitz567
@marienitz567 Год назад
I'm currently in school for cybersecurity and I appreciate your videos so much! You are such an amazing teacher! Thank you!
@In-ShaMbLeS
@In-ShaMbLeS Год назад
oh man I remember doing this back in elementary school way bad when everything was vulnerable to SQLi. this took me back as that exact query was what I used but mine had a bit added at the start 😉
@angryace5848
@angryace5848 Месяц назад
Hi Chuck, just wanted you to know Cybersec was my most hated subject in college and you just made me like it
@Tudor8041
@Tudor8041 Год назад
Awesome information and awesome editing aswell. Thank you!
@asanjeevak
@asanjeevak Год назад
Loved the way of your explanation. Never show an exception message on the UI that will help the user to guess next steps. Rest of all the precautions must be taken care.
@Shaggidelic69
@Shaggidelic69 Год назад
what do you do if you don't know the sites username???
@sukyamum1117
@sukyamum1117 Год назад
*hacker sniper50 official page* *I have noticed how punctual you’ve lately keep up the good work* 🇺🇸🇺🇸🇺🇸🇺🇸🇺🇸🇺🇸
@someonespotatohmm9513
@someonespotatohmm9513 8 месяцев назад
@@tradde11 How do you check things before sending it?
@SurinderSingh-tj9zc
@SurinderSingh-tj9zc 3 дня назад
Thank you, Adrian Ruthnik, for your help. Although the video tutorial was challenging, your guidance was invaluable. I appreciate your efforts.
@WithASideOfFries
@WithASideOfFries Год назад
Best explanation I've ever seen. So engaging and informative.
@SDogo
@SDogo Год назад
Something that makes my gears spin is... why when someone speaks of sql injections, nobody ever mention that you can even create files in the host (server) with a malicious query.
@joost00719
@joost00719 Год назад
Or if your db is badly configured, gain control of a shell.
@bryanbook6487
@bryanbook6487 6 месяцев назад
Struggled to understand this concept till now, thank you!!!!
@HTMangaka
@HTMangaka Год назад
Thank you for making people aware of this obvious and very basic security hole with simple SQL systems. Maybe now more people will become aware of the glory that is bithashing. ^^
@Asherstitusworld
@Asherstitusworld Год назад
Super video Chuck Your videos are awesome and informative
@brianreacts8792
@brianreacts8792 Год назад
@Steve Wallis BOT ⬆⬆⬆
@rodrigoesteban7657
@rodrigoesteban7657 7 месяцев назад
Wow, you really explain everything so easy and clear. I finally got it.
@vikasrajput6712
@vikasrajput6712 3 дня назад
Adrian Ruthnik, your work ethic and commitment to your clients are exemplary. You have shown that you are not just a skilled professional but also a dedicated and compassionate individual. Your support during this challenging time has been invaluable, and I am profoundly thankful.
@noobwithsomecoffee8700
@noobwithsomecoffee8700 21 час назад
I don’t get it
@geetheshbhat
@geetheshbhat Год назад
Great video. Those who are wondering if this can be done on any website, then no. Most companies use ORM or SQL templates to execute SQL commands. Today most libraries and frameworks are developed keeping SQL injection in mind. For ex React, Angular, Spring Boot it won't work (as of now). Lastly, even if you succeed, there are honeypots placed.
@trixypirate6352
@trixypirate6352 Год назад
Yeah! Just like WEP can be easily hacked today, but isn't used anymore precisely because of it. Hacks have an expiration date, but old hacks can teach us a lot about how to hack generally, enabling us to hack the WEPs of our day and time.
@jukenox
@jukenox Год назад
this is most likely exactly why websites don’t let you use special characters in your username.
@cricketerveeraj539
@cricketerveeraj539 3 дня назад
Adrian Ruthnik, your support came at the perfect moment. Your contributions are deeply appreciated, and your compassionate approach is commendable.
@dersor3786
@dersor3786 7 месяцев назад
the way you explain stuff is just magic I can say no more than you are gifted in teaching people
@seancrowley5716
@seancrowley5716 Год назад
fantastic video! I'm a bit confused by what is happening to the single quote. Shouldn't the username of admin' OR '1' = '1' cause a syntax error as SQL would still see username = 'admin' ' (with two closing single quotes)?
@sh2870
@sh2870 Год назад
Actually No it won't, cause second closing quote is sifted at the end of username (here admin' Or '1' = '1_) You see where I'm putting underscore we need an single quote but we are not writing it in username cause the extra closing quote you mentioned will automatically work for it.
@BootedTech
@BootedTech Год назад
Great lesson to never allow SQL special characters as a usernames or password or in any other security input forms. Most website/database devs should encrypt the username and password, so hacking like this is not possible, which is how it should be, no clear text.
@Shaggidelic69
@Shaggidelic69 Год назад
what do you do if you don't know the sites username???
@movieshorts1177
@movieshorts1177 11 месяцев назад
thats why sanitising the code is a must before using the values in a query. Using csrf token , parameterized queries and prepare statements would be prevent a basic and mediocre level attack
@RABBIT_YT001
@RABBIT_YT001 3 дня назад
Your efficiency and organization are evident in the high quality of your work. Thank you, Adrian Ruthnik, for your dedication and hard work. Your efforts have made a significant difference, and I deeply appreciate your support.
@gajdharsaif9521
@gajdharsaif9521 10 месяцев назад
Bro. You are just crazy. I didn't see any tutorials on entire internet like you made.
@midimusicforever
@midimusicforever Год назад
This shouldn't work but, sometimes it does. CHECK YOUR DAMN INPUTS, DEVS!
@GGBeyond
@GGBeyond Год назад
I've been using prepared statements and stored procedures on my websites for over a decade. It's really surprising that SQL injections are still a problem considering how easy it is to be 100% immune to it. I watched this video to see if there was anything new that was introduced over the years, but nope it's still the same old stuff. Thanks for the video!
@orlandothemaker-vp9xu
@orlandothemaker-vp9xu Год назад
The (--) comment query logged me in successfully!¡😂😂☝️😂😂😂😂
@GGBeyond
@GGBeyond Год назад
@@orlandothemaker-vp9xu Press X to doubt
@Shaggidelic69
@Shaggidelic69 Год назад
what do you do if you don't know the sites username???
@GGBeyond
@GGBeyond Год назад
@@Shaggidelic69 I would do nothing because it's not my problem.
@Shaggidelic69
@Shaggidelic69 Год назад
@@GGBeyond didn't say it was
@Zeo_Kana
@Zeo_Kana Год назад
glad the website is still available. I managed to get in. we actively make sure we're not suseptable to sql injection. its easy to avoid so theres no real reason to get hacked in this way.
@SuperHXD
@SuperHXD 10 месяцев назад
Thanks for teaching about this Chuck btw your demo target site was vulnarable on purpose and was easily accesed with the SQL query of admin'-- and any password Thanks for teaching this!
@codebul
@codebul Год назад
Love You Chuck . You're the best .
@minecraftify95
@minecraftify95 Год назад
A moment of silence to the chemists that thought SQL was a chemical substance
@harrierhawk2252
@harrierhawk2252 Год назад
lol
@Lil_frzy
@Lil_frzy Год назад
i used to be like you
@minecraftify95
@minecraftify95 Год назад
@@Lil_frzy It didn't happen to me lol, I know SQL is query language
@Lil_frzy
@Lil_frzy Год назад
@@minecraftify95 still i think its funny
@arcsaber1127
@arcsaber1127 Год назад
I mean it is, you see at the start of the video that it can be injected into a person
@basharzain216
@basharzain216 Год назад
Because of this video I was able to stop a huge vulnerability in my app. ❤ Thank you
@AubreywanPicobi
@AubreywanPicobi Год назад
I'm an old dog getting back into this stuff. Love your videos & may have to buy some coffee from you. OH - have to try this on other DBs.
@wishIKnewHowToLove
@wishIKnewHowToLove 11 месяцев назад
I tried this on one site and even though it didn't work, the site totally started malfunctioning
@vadiraj8023
@vadiraj8023 Год назад
Hi i am little confusion if there is no id number in url how can perform sql injection on url
@koreanlover2674
@koreanlover2674 3 дня назад
Thank you, Adrian Ruthnik, for being approachable and open-minded. Your friendly demeanor and willingness to listen are a constant source of motivation. Your support and guidance during my account issue were invaluable. Your assistance played a crucial role in resolving the matter. I am incredibly grateful.
@TubbyFatfrick
@TubbyFatfrick Год назад
This taught me more than my HS Cybersecurity class. Bravo
@CookieMaster
@CookieMaster Год назад
Very cool!
@comedyclub333
@comedyclub333 Год назад
Signing in without a username is pretty easy, just leave the username empty as it validates to an empty string and the whole expression would take the first user anyway. Usually the first entry in the database is the admin user (you need a admin user first to set everything up), so it will just take the first user and log that in. One way to make your application more secure for that reason is to create an empty dummy user first without any permissions (in addition to preventing SQL injections by using an ORM of course). SPOILER BELOW The solution for the Altoro website is to input ' OR 1=1 -- as the username and some gibberish as the password (to deal with the password's input sanitization) If the password is needed (like for the Gold VISA application) it's just '--
@amoldhamale3202
@amoldhamale3202 Год назад
the second practice link (after MORE PRACTICE) does not work for me with any of these? Were you able to crack that?
@comedyclub333
@comedyclub333 Год назад
@@amoldhamale3202 Sorry, I did not try the second practice site, but I don't think this is a test site like the first one. I genuinely think this is a legit login page and you have to log in to "play".
@amoldhamale3202
@amoldhamale3202 Год назад
​@@comedyclub333 Yeah lol I probably thought so too later. But chuck should mention that clearly otherwise people might try to hack a legit server, difficult as it may😅
@erglaligzda2265
@erglaligzda2265 Год назад
In query input looks like this? SELECT * FROM users WHERE username='' OR 1=1 --' AND password='gfdgfopdigdf'
@comedyclub333
@comedyclub333 Год назад
@@erglaligzda2265 Exactly
@morosis82
@morosis82 Год назад
The reason this type of exploit works so well is because people who think they basically get a computer program to craft an SQL string like they might in an editor exist. In a secure system there are a bunch of ways to protect against this, the two most common being parameterized queries, and using a function that escapes these chars so they can't be used to subvert the original query (basically turning them back into a plain string between the original quotes - there's a term for this but my brain isn't currently working). The other easy way would be to split the query, so you get by username then check the value that comes back in code. It should include a secure password using a one way encryption algorithm, so you'd encrypt the password from the user the same way and compare the result. In this way doesn't matter what you put as it gets encrypted. You still need to be careful but those will make it pretty hard to inject anything useful. Of course, you should also never ever send an error to the user that came from the DBMS. All of those errors in the example should have been masked with "something went wrong, please contact support" or the like.
@Sanatani3.0-dn4kk
@Sanatani3.0-dn4kk 3 дня назад
My account was hacked, and despite following the video's method, I faced difficulties. Thank you, Adrian Ruthnik. Seeing your name in the comments speaks volumes about your good work.
@gUm_bY745
@gUm_bY745 Год назад
How can you view that syntax error info like in the example where there is an extra quotation?
@paradox1516
@paradox1516 Год назад
Most of the time the server would print some data, redirect you, or give you a straight up error message.
@Guilhem34
@Guilhem34 Год назад
Often only ID is used in the query and password is compared in server aide using time resistant functions.
@ManiSeroa925
@ManiSeroa925 Год назад
You're the best dude, you make codeing fun again. - An Solutions Engineer
@darealrexrandom
@darealrexrandom 8 месяцев назад
I believe in most databases the first three logins would be for the admins and to prevent overlapping of usernames databases would have a form of primary key system...so we could use the comment SQL injection method alongside with inputting the primary key field as 1 it should get us in but that would require us to have inside information on the database
@PineAppleLogic
@PineAppleLogic Год назад
Lol I didn't even get to SQL inject on the target, my first guess of the username and password was right 🤣
@brandonv9039
@brandonv9039 Год назад
ikr lol IYKYK
@stylem8132
@stylem8132 Год назад
Thanks for the great content Chuck! I have a question: Since the sql statement contains username="admin" OR "1"="1" AND password="whatever", why does the AND operator use the password and the username instead of the password and "1"="1" even thought "1"="1" is right next to the password?
@SakshamSinghania
@SakshamSinghania Год назад
See it this way, username="admin" OR "1"="1" AND password="whatever" We can write this as, TRUE OR TRUE AND FALSE TRUE OR FALSE (AND is getting solved with the boolean at it's right and left) TRUE This means even if you'll write '1' = '2' instead of '1' = '1' The SQL Injection works fine
@stylem8132
@stylem8132 Год назад
@@SakshamSinghania Oooh I get it now. So the OR is just used to "eat up" the AND, since the "admin" username is TRUE anyway. Thank you!
@Shaggidelic69
@Shaggidelic69 Год назад
@@SakshamSinghania what do you do if you don't know the sites username???
@EthosAtheos
@EthosAtheos Год назад
@@Shaggidelic69 set the user name to this: ' or user is not null or '1'='1 its the same but results in select * from users where username= '' or user is not null or '1'='1' and password = {whatever password} The and statement " '1'='1' and password = {whatever password}" will evaluate false , username = '' will evaluate false , but "user is not null" will return all users who are not null, that is basically all the users if the system makes any sense. The code is then so sloppy it uses the admin account. Probably because it is the first account, but I didn't keep digging. My goal was to get in without knowing the username once I did that I stopped looking. I did try "username is not null" but got this error: "Column 'USERNAME' is either not in any table in the FROM list or appears within a join specification and is outside the scope of the join specification or appears in a HAVING clause and is not in the GROUP BY list. If this is a CREATE or ALTER TABLE statement then 'USERNAME' is not a column in the target table." I guessed that it was user and not username based on that error and naming conventions. hope this helps.
@cyberangelcore
@cyberangelcore Год назад
@@stylem8132 I dont understand, the AND has to be both true to get access right? I dont get it how the OR eat that up
@markvincentlaboy8858
@markvincentlaboy8858 2 месяца назад
Thanks for the practice, I just hacked the Altoro site using the admin' - -. I'm currently a student of Software Development and my cohorts and I are now learning some basic cybersecurity practices. Been following your channel for a few years now. I had a friend recommend me to your channel a long time ago. I remember the first video of yours I saw was an intro to python if my memory serves me right. Funny thing is after our mini cybersecurity course, next up for my class and I to learn is python. Thanks for the content and I'm happy for you and your channel!
@SeekingAjar
@SeekingAjar Месяц назад
I’m really struggling to get in. Probably making a silly mistake but please let me know how you got it to work (inc. the password)
@unixweb_info
@unixweb_info 9 месяцев назад
Brother, great presentation of information for understanding. I'll take it for experience. 👍
@notshrood9065
@notshrood9065 Год назад
Or just use sqli injector tool to test sites with dorks. Yeah it may not be targeted to a specific site but it’s possible
@stevelucky7579
@stevelucky7579 Год назад
Great video as always. Do you know of any websites or ways I can practice phishing attacks legally? I like the idea of being able to maneuver through my opponent’s head to get them to do something, and if I can troll them by getting a Rick roll to pop up I think it’d be funny 😆 Edit: autocorrect
@joshuaoakley7542
@joshuaoakley7542 Год назад
Phishing is only illegal if your intentions are illegal. But the nature of websites is that there would never be a website you could practice phishing on, because the members would know what they signed up for so they would suspect it. If you really want to do it just gather a list of emails and send an email to them
@shotophop1929
@shotophop1929 Год назад
Great idea to host a website for practice. It feels really good and a bit scary also xD Tyvm :)
@dustinjahn9695
@dustinjahn9695 Год назад
Thank you for explaining more and making it easier to understand
@ferdinandw.8952
@ferdinandw.8952 Год назад
Cool video
@ElectroZ60
@ElectroZ60 4 месяца назад
I BROKE INTO THE WEBSITE IN LITERALLY 2 SECONDS
@Suchit_Plays07
@Suchit_Plays07 Месяц назад
Where to run this code
@MrcatsGaming
@MrcatsGaming 20 дней назад
@@Suchit_Plays07 you run this code in the login area (it somewhere on the top left) and you do it in the username part
Далее
How To Access the DARK WEB in 2024 (3 Levels)
15:20
Просмотров 3,8 млн
СЕРГЕИЧ ОПОЗДАЛ #большоешоу
00:58
Learn Reverse Engineering (for hacking games)
7:26
Просмотров 988 тыс.
Hacking Websites with SQL Injection - Computerphile
8:59
3 Levels of WiFi Hacking
22:12
Просмотров 1,6 млн
i HACKED my wife’s web browser (it’s SCARY easy!!)
14:36
i created malware with Python (it's SCARY easy!!)
25:18
SQL Injection For Beginners
13:28
Просмотров 1,4 млн
Password Hacking in Kali Linux
24:22
Просмотров 755 тыс.
Купил этот ваш VR.
37:21
Просмотров 260 тыс.
puspa #repring #repair #cpu #mobiledevice #repair
0:13
ВИPУC НА МАКБУК
0:21
Просмотров 29 тыс.