SQL Injection - Lab #17 SQL injection with filter bypass via XML encoding | Long Version

preview_player
Показать описание
In this video, we cover Lab #17 in the SQL injection module of the Web Security Academy. This lab contains a SQL injection vulnerability in its stock check feature. The results from the query are returned in the application's response, so you can use a UNION attack to retrieve data from other tables.

The database contains a users table, which contains the usernames and passwords of registered users. To solve the lab, perform a SQL injection attack to retrieve the admin user's credentials, then log in to their account.

▬ ✨ Support Me ✨ ▬▬▬▬▬▬▬▬▬▬

▬ 📚 Contents of this video 📚 ▬▬▬▬▬▬▬▬▬▬
00:00​​​ - Introduction
01:24 - Navigation to the exercise
01:52 - Understand the exercise and make notes about what is required to solve it
02:57 - Exploit the lab
08:07 - Summary
08:25 - Thank You

▬ 🔗 Links 🔗 ▬▬▬▬▬▬▬▬▬▬
Рекомендации по теме
Комментарии
Автор

These labs with ZAP Proxy would be great. Burp Suite is too expensive, and Community Edition is very limited. I'd love to learn ZAP with you.

soyalvdev
Автор

Thankkk Rana🥺🥺 I was waiting for this🥺 and finally came thank you3x

roastedChickn
Автор

Very well explained... But how you identified that we need to encode this in hex entities only. Any way to identify this?

shyamdhuriya
Автор

why did u use hex entities for encoding? how do i come to know the encode format?

gamerholmes
Автор

hackvertor is not installing. but just showing installing. How can I fix this?

mdabdurrahim
Автор

Well done i just follow your content is amazing, now i am doing a course with (s4vitar ) wish ia the biggest pen testing content creator in Spanish but definitely i will be popping my head in your channel, ( 90% من مواصفات مرات احلامي ،فيك )

JamesBond-xyux
visit shbcf.ru