Time-Based Blind SQL Injection!

preview_player
Показать описание
👩‍🎓👨‍🎓 Learn about SQL Injection vulnerabilities. In this video, we are going to have a look at how to retrieve data from a PostgreSQL database by monitoring DB sleeps using the pg_sleep() function.

Overview:
00:00 Intro
00:13 Lab overview
00:53 Using Stacked Queries
02:29 Query for Administrator Username
03:10 Find out Length of Administrator's Password
04:32 Retrieve Administrator's Password
09:56 Conclusion

---

Рекомендации по теме
Комментарии
Автор

How did you determine that this application is using postgresql?

GilchristAime
Автор

I am a beginner learning SQLMAP, I often find databases that have time-based blind type parameters, how do I solve this problem, please help

joker-pjcm
Автор

Thank you !
Why does the SQLi need to be encoded here ? In every other challenge involving this trackingID cookie, it did not need to be encoded

stepanparant
Автор

Great content and easy to follow, well done!

jaimeloera
Автор

Thanks for sharing! Would like to ask about what is the use of %3B in the beginning of the test.

linus-hung
Автор

Great video! But I have a small doubt .... I have injected : 0'XOR(if(now()=sysdate(), sleep(30), 0))XOR'Z& and in the Response it took me around 60.833 milliseconds so I am confused here why is it taking such a long time to respond what exactly does this mean.... Plz help

ZarkaKhan-vvko
Автор

I see this lab has the vulnerability in the tracking id cookie. What are some common input methods for this type of vulnerability? search input, category filters, ....or is it only in cookies/tracking id's?

djkuco
Автор

THANK YOU! I had been looking all over trying to understand WHY %3B was needed, it was driving me crazy. Appreciate you breaking it down how you did.

Zigzog
Автор

Thank you so much for you great efforts

I wan to ask you about a hard situation i got on many website vulned to SQLI
SQLMAP success to make the Payloads but can't receive and enumerate the Database because the WAF (Akamei)
i have try to use --tamper= all the scripts without any success to receive the database name any solution how to bypass WAF in SQL Injection with SQLMAP?

costycrypto
Автор

Excellent video, you mentioned w python script to do this, can someone help me out what that would look like having trouble looping 💔🙈❤️

turin
Автор

Is ' UPDATE ' can be performed in this time based SQL injection

alwaysnithin
Автор

Nice tutorial. Please mention the software you are using to inject the HTTP header.

laventharma
Автор

this is awesome :) i knew how to do this manual but doing it automatically in burp is fantastic! great video

presequel
Автор

How can we defend our website from this injection?

sauliko
Автор

false positive or unexploitable injection point detected solutions and why there its come when time based blind vulnerability is available. Please give solutions

coders_algoritmers