I think better web app for practicing blind sql injection is bwapp not dvwa. This is half blind and half union based sql injection example actually. In blind sql injection you can't see output from database at all. And thanks zaid I started learning web app pentesting from your course.
@idkk403 Жыл бұрын
Thanks, really helped understanding the concept.
@wolf72514 жыл бұрын
018: You did mention about previous example, but this is the only SQL Injection video in your channel. If I missed it, could you share the link please. Thanks
@sniperking31354 жыл бұрын
Please make a video on installing metasploitable and adding it to virtual box.
@Brokify13 жыл бұрын
just download the .ova file double click and click import that is it man
@darkcheq4 жыл бұрын
the %23 , you put on the link are the -- symbol? and if yes how did u find it ?
@sachinmaurya32593 жыл бұрын
%23 is the url encoded value of # it means %23=# as we are writing in url we cannot directly write the "#" therefore we have use %23 as url encoded value Hope this help :)
@LoneVocalist3 жыл бұрын
I don't get it. Why not just SQL inject first anyway to see if it works or not. What did the blind injection prove?
@erobtenorio3 жыл бұрын
This kind of technique is used when you don't have an explicit response from the server to determine if your query was correct or not or even interpreted, at that point you need to ask the server for true and false questions in order to steal data. One method to determine if the app is vulnerable is to check for the response when you ask for a true and false statements, i.e: when TRUE you will receive one kind of response(a normal page let's say), when FALSE you will receive a diferente response (e.g page with an error), if that happened you can determine that the app is vuln for injection since you are getting a response for your crafted TRUE and FALSE questions (query). So it proves that... if the app if vuln or not, the you can proceed with your injection methods.
@unit42463 жыл бұрын
is not blind Sql .
@justkiddieng6317 Жыл бұрын
i also thought that but it is, it's called boolean-based but it would be more practical if he use another attack like time-based