SQL Injection - Lab #7 SQL injection attack, querying the database type and version on Oracle

preview_player
Показать описание
In this video, we cover Lab #7 in the SQL injection track of the Web Security Academy. This lab contains a SQL injection vulnerability in the product category field. To solve the lab, we perform a UNION based SQL injection attack that queries the database type and version on Oracle.

▬ ✨ Support Me ✨ ▬▬▬▬▬▬▬▬▬▬

▬ Contents of this video ▬▬▬▬▬▬▬▬▬▬
00:00​​​ - Introduction
01:24 - Understand the exercise and make notes about what is required to solve it
02:18​​ - Exploit the lab manually
13:26​​ - Script the exploit
26:20 - Summary
26:50​​ - Thank You

▬ Links ▬▬▬▬▬▬▬▬▬▬
Рекомендации по теме
Комментарии
Автор

جزاكى الله خيرا ونفعك وزادك من فضله فى الدنيا والاخرة بأذن الله

mostafasayed
Автор

8:26 i found that working with + at in end
like that > Pets'+UNION+SELECT+'a', 'a'+--+

privacy
Автор

This is really helpful 👌
Thank you!! For the video, mam

faysal_skt
Автор

1) is there any way in which we can combine multiple row result in one row ?? 2) how to get all database name or schema name in oracle ??

MidnightSpecter
Автор

Great video! Thanks so much. Would loved to see this written in Go(lang) if you'd be up for it just to see how it compares!

fdisnightwing
Автор

Hello Rana, the default query is "SELECT banner FROM v$version" but in the payload you put a comma (, ) after banner (UNION select banner, NULL from v$version). I don't understand this one. It would be of great help if you can kindly explain little bit more about the payload.

TomJerry-ztbp
Автор

Your videos are good but I challenge you to hack me ;-)

invisibleman