This video shows the lab solution of "Blind SQL injection with time delays" from Web Security Academy (Portswigger) Link to the lab: portswigger.ne...
Пікірлер: 8
@muhammadfauzan63793 жыл бұрын
Great work
@tehdisko3 жыл бұрын
does 'and pg_sleep(10)-- work? I tried but no effect. Why can it be wrong?
@ahmedsaleem93273 жыл бұрын
same question
@duylt5_letrongduy7432 жыл бұрын
Why don't you try using AND or anything else but use || first?
@dadogwitdabignose9 ай бұрын
that is the operator for postgresql you are thinking of mysql
@soapdude48903 ай бұрын
The reason pg_sleep(10) is executed instead of simply being concatenated as a string in the injected SQL query is due to the way PostgreSQL handles expressions and function calls within SQL statements. Here's the breakdown: 1. Concatenation and Expression Evaluation In PostgreSQL, when you use the || operator to concatenate strings, each part of the concatenation is evaluated individually as an expression. When you include a function (like pg_sleep(10)) in the concatenation, PostgreSQL first evaluates this function, executing it if necessary, before concatenating it with the string. at least what chatgpt sayhs
@hnq27363 жыл бұрын
pls, can you tell me why use pg_sleep() why not use sleep()? Why do u know?
@ucminhnguyen56103 жыл бұрын
theo mình, là do đây là PostgreSQL. Còn để biết vì sao là PostgreSQL thì thử cả 4 truy vấn của 4 loại cơ sở dữ liệu