SQL injection with filter bypass via XML encoding

preview_player
Показать описание
NOTE: Watch out with the XML structure, when you insert the malicious UNION Query ;)
Рекомендации по теме
Комментарии
Автор

7:30 Boom! Thanks for the great walktthrough!

sackwhacker
Автор

hey, you had a mistake at 4:54. you click on the dec_entities, and this is wrong, that was the hex_entities. Because my lab showing me a 0 unit error.

iamagastya
Автор

Thanks for making the content and explaining, appreciated \o/

JuanBotes
Автор

thank you it worked for me you are explaining very good

mike-nnmq
Автор

Sir if u r reading this comment plz tell me why didnt u try to inject in the product id section of the xml in the first place because i tried few queries OR 1=1 and OR 1=2 and the result changed on the basis of the query which means sql injection is possible there as well but i cannot retrieve the user credentials in the same manner as i was able to do in the store id please tell me. THANKS FOR THE WALKTHROUGH

AnishKumar-tu
Автор

Today I tried with same payload but got attack detected! Not sure how to fix

ProsenjitManna
Автор

Why are you sleeping while making videos, btw good content

stepbroimstuck
visit shbcf.ru