I have started work at Amazon Web Services. Will you be keen to see a day in the life of an AWS cybersecurity professional? :)
@sushilbalami3 жыл бұрын
Yes 😀
@whoami61073 жыл бұрын
Yes
@N1612N3 жыл бұрын
Yeh. We are waityn
@Zerefxstar3 жыл бұрын
Yes and also process to reqch there
@ayushchaudhari56553 жыл бұрын
YES YESYESYES
@viallymboma9874 Жыл бұрын
I love this channel: Straight to the point No jokes No advert Nothing extra outside of just learning content Great great great 👍🏽👍🏽
@iankip342910 ай бұрын
Would you help show the installation of the bricks web app. I have installed it and tried to run it but I receive an error saying there is an error in line 9 in the config.php file.
@g3n3sisofficiel43 жыл бұрын
a lot of guy on youtube share video and some step are skipped and when im trying at ame time i need to start again ,your video , not 1 time i move video backwards good explication . nice job
@JohnRobertPotter3 жыл бұрын
I actually think I love you. Every video you make basically saves me 1-2 months of life, I seriously can't thank you enough!!! Just yes
@rcsxuth85943 жыл бұрын
Sus
@JohnRobertPotter3 жыл бұрын
@@rcsxuth8594 idc
@rcsxuth85943 жыл бұрын
@@JohnRobertPotter u were like : omg..>! i think im in love with you!
@JohnRobertPotter3 жыл бұрын
@@rcsxuth8594 yep
@rcsxuth85943 жыл бұрын
@@JohnRobertPotter nope sus still if u say idc then u sussy baka and if u try to cheat the system u gay af fr
@letshack0103 жыл бұрын
You are the only person who discusses hacking material on KZbin but KZbin doesn't block you, I like your style, you are my guide
@letshack0103 жыл бұрын
@@900dm4n oh god, sure:)
@cryproot98452 жыл бұрын
I have started in this beautiful world of content on KZbin, I am new to this and here we go with issues of cybersecurity and ethical hacking
@kostiapereguda3 жыл бұрын
this was useful like in the 20th century, but now everybody uses libraries to abstract over sql and those utitlize the protection mechanisms against this kind of injection. And even if you don't use libraries, then you can just use escape charaters (eg: &qt) for quoting and all will be fine
@altayyerassyl3213 Жыл бұрын
there is an answer for your complain under your comment, lmao. " Thank you so much Loi! Your info is extremely valuable for beginners who are trying to make their websites slightly more secure. " It is not about hacking the system, but for teaching beginners to understand what technologies are used to hack, so we beginners can prevent them.
@skltfz4997 Жыл бұрын
the thing to bring out is some sites developed by devs that didn’t aware it. and you were the customer of that site who inputted the cred info 😂
@kostiapereguda Жыл бұрын
@@altayyerassyl3213 I understand your response now that you commented it 18 hours ago. I agree with you that this information is extremely valuable for beginners, and I actually did the full PortSwigger Labs course on SQL injection myself. However, my comment was written more than a year ago, and back then the video was called “How to scan and PWN any website”. It was NOT called “SQL injection for beginners”. Therefore, I excepted this video to be much more advanced and cover advanced topics applicable to modern times. You can see a lot of comments very similar to mine in that regard. I guess that’s why the author eventually renamed the video from click-bait crap to something useful.
@strang7739 Жыл бұрын
@@kostiaperegudaplop just used sql injection to hit moveit and the US defense lmao, now it doesn’t look dumb does it 😊
@kostiapereguda Жыл бұрын
@@strang7739 in general such vulnerabilities are discover by tools, not by people, moreover, specific vulnerabilities like injection vulnerabilities are discovered mostly using white-box analysis, which operates on the source code. It is very rare that black box analysis alone can discover such specific vulnerabilities. Therefore, most of the vulnerabilities are published by the software manufacturers themselves, together with updates fixing those vulnerabilities. However, the hacker gangs try to perform what is known as a zero-day exploit. They target users of the software, who has not updated immediately, and thus hack them using publicly known vulnerability. This is exactly what clop has done. Clop used publicly available exploit to hack into organizations who have not updated the software. 90% of security breaches are actually exploiting already known vulnerabilities and publicly available exploits of the older versions of the software and are happening because users are not updating their software to the newest version. P.s. that’s why you must never disable automatic Windows updates on your PC:)
@nawid16873 жыл бұрын
Thx for making my requested video!! Apreciate it!
@robertfisher35073 жыл бұрын
A simple way to protect input fields is to convert them before they are part of a sql query. It could be as simple as base64(input string). This way the original query can not be injected. You could also modify base64 algo by shuffling the defined character string of the base64 algo.
@damegaye30513 жыл бұрын
Thats why we gotta hash passwords??
@timmytainment2 жыл бұрын
@@damegaye3051 No. You hash them because if the database is getting hacked, the hackers only got hashed pw instead of plaintext pws. You can crack them with the help of rainbowtables but it needs to be in there to do so.
@timmytainment2 жыл бұрын
Maybe I get you wrong but I think what you say isn't working. Instead of base64 them (which means they would decrypted and executed aswell) you should use something like "mysql_real_escape_string" and for security reasons and cleancode aswell you shul typehint them. So, if you are working with GET and POSTS from whereever (even in Cookies, which can be manipulated easily) you should do something like $myGetter = (int) $_GET['myGetter'];
@HackSociety Жыл бұрын
@@timmytainment i cracked a hash some time ago, and the password was 1233abcd.. lol
@chrispaul4090 Жыл бұрын
Use prepared statement, hash and salt the password.
@haydeneisenstein10923 жыл бұрын
i have no clue what to do with this but ill keep it in mind
@Guide4Ever3 жыл бұрын
@@callimero2731 There is no need for teamwork lol. SQL injections are plain and simple, either via the list of SQL queries or centralized injection systems that sprout these attacks. This is not movies lol, when hackers work with each other and say: "I'm in!", hahaa. It is usually one perpetrator. Nowadays, due to many services offering DDOS protection, it is more likely to get hit by MTM (man in the middle attacks) that abuses the communication between two users by altering the message or stealing ID_key from either valid communicators and then communicate with 1 of them instead. Though true, DDOS attacks are **sometimes** performed in groups due to sheer overload needed to crash a desired service. Usually, perpetrators turn to bot networks or service injections that use foreign/unauthorized access to vast amounts of computers. Then, they use them to send the payload to the certain service's address. However, due to the filtering systems used nowadays by packet management systems in our devices...it is hardly possible to do anything decent without proxies.
@callimero27313 жыл бұрын
@@Guide4Ever Thank you, it was just my opinion
@williambabin73503 жыл бұрын
@@callimero2731 who tf is using sqli for ddos?
@lanmeglic24012 жыл бұрын
u can extract data from website that us vulnerable to this exploit.
@landokiprooo62723 жыл бұрын
I like how the video is entitled "Learn from a pro hacker now" this got me to watch this fr
@riotgrrl26663 жыл бұрын
Thank you so much for uploading this, i'm VERY interested in cybersecurity but as far as i know, none of the universities near me have it as a career option and i find your videos to be really informative and entertaining!
@Opama-devlogs2 жыл бұрын
tryhackme and hack thebox u probally found it now
@AhmadShohaibArab Жыл бұрын
where do you live?
@Dev_Everything Жыл бұрын
Thank you for making this. I am getting into backend webdev and this helped me audit my own code. Thanks!
@tallst13 жыл бұрын
I love this video. Got me excited about Pentesting again
@nikolaymihaylov89915 ай бұрын
Thank you Mr.Yang. You helped me to graduate from university. THANK YOU! :)
@sorrefly3 жыл бұрын
This is actually awesome to show sql injection tools but that was not an SQL injection principle tutorial Thank you for the video btw, very helpful for me! :)
@andyrew453 жыл бұрын
Subscribed - learnt more in 5 mins than 5 years
@LL-kz7ge3 жыл бұрын
I mean, just escape your damn SQL. Take advantage of libraries such as PHP's pdo, nobody has got pwn'd like this since the early 2000's.
@andyjackson36633 жыл бұрын
Exactly - this is like telling people to take advantage of an XP loophole when everyone isn't using XP. ANYONE making a website that doesn't use prepared statements, and input escaping basically shouldn't be doing it. Most people with little to no web skills will probably use an off the shelf CMS like Wordpress and that has all these entry points covered. They'd either do it themselves using that or go to an external design agency who will do it for them. There are so many off the shelf packages and "systems" (squarespace etc) now that having a modern website is so simple my 12 year old can do it. All those websites come out of the box with inbuilt protection against this sort of stuff so this video will only help you against a website that hasn't been updated in years, and is most likely not even relevant any more anyway. Appreciate the content but you should be focusing on the nature of these exploits and what people should be doing to defeat them.
@andyjackson36633 жыл бұрын
In addition - a lot of "quality" web hosting providers include auto blocking of attempts to run sql injection so repeated attempts will fail (often the first time). I know of one that increases the ban time by a factor of 2 each time it detects such an attack starting at 2 mins for the first attempt. 15 attempts in and you have to wait over 540 hours before the webserver will even speak to your machine to announce it's accepting your connection, let alone run any kind of input for you...
@tyler.30153 жыл бұрын
@@andyjackson3663 do you know some of the more effective attacks being used today like xss or something else ?
@InfoSecIntel3 жыл бұрын
It's still plenty common in websites up today, even ones that are brand new.
@tonyme74263 жыл бұрын
Still part of the ethical hacker courses, so still relevant. Be thankful people take their time to produce such content instead of trying to be a clever shyte.
@dodzb73623 жыл бұрын
this is fixed years ago. using escape characters or isolating the input. Basically, just proper programming practices will do the trick.
@hercules.mazucato3 жыл бұрын
Devs are gods in earth
@AngelVlad1003 жыл бұрын
Yeah, now all modern languages have build-in escaping or ORMs. This vulnerability dead from ~2007.
@dodzb73623 жыл бұрын
@@AngelVlad100 super agree
@PastEventsTV2 жыл бұрын
@@AngelVlad100 haha lol ...sql injection is still no 3
@AngelVlad1002 жыл бұрын
@@PastEventsTV I know, but I didn't see any actual public website with such vulnerability for the last 10 years.
@harryrotcher54053 жыл бұрын
I like how you explain all in simple terms...
@scarytruths01 Жыл бұрын
This is useful information so important about 95% of vulnerability disclosure programs are all looking for this vulnerability
@IbrahimGanaMalgwi3 жыл бұрын
I want to thank you for inspiring me to take up Cyber Security. I just paid for your training on Udemy.
@Hephasto3 жыл бұрын
Don’t fool anyone, you’re going to become a hacker!
@hamzajon88233 жыл бұрын
@@Hephasto no harm on that , how are we gonn improve our security if there is no one to hack it 😜😜
@Hephasto3 жыл бұрын
@@hamzajon8823 if there was no hackers there would be no need to secure anything, does it make sense?
@ptrck0703 жыл бұрын
@@Hephasto and so millions of jobs would be gone
@themotherandthesons Жыл бұрын
This is crazy I'm glad I saw this red team security demonstration
@yohbabyg66553 жыл бұрын
You are great teacher. I am new to cyber security. Have been seeing videos on KZbin and so far you are the best. How can I join your members only channel? I’m quite excited about learning.
@ponely96783 жыл бұрын
Next to the subscribe button, there is a join button. You have to pay for it
@Kiddie913 жыл бұрын
Sir, as you are an insane expert in this field we want to know what are the steps you followed to get up to this stage what are the things you followed and etc, please make video on this.
@pok78352 жыл бұрын
mostly of the ORMS in the market today treat this issue. But in my college times i have enjoyed this :)
@beaustrom9233 жыл бұрын
4:24 in as of commenting this. Thats super creative, just getting it to put syntax into its message. Legit classic movie style.
@francesgisondi72163 жыл бұрын
Wat do u mean. Hope u dont mean that, Thats a virus!!!
@beaustrom9233 жыл бұрын
@@francesgisondi7216 Hope I don't mean what?
@21-muhammadfierlyanirwandi363 жыл бұрын
always love your content loi
@tojogamer17333 жыл бұрын
Informative video, thank you, but naming it "How to scan and Pwn any website" may be a little misleading. Some people will think that "any" website using a database suffers from sqli, which is not the case
@DirePantsDim3 жыл бұрын
It should be titled "**some old websites".
@stevema23 жыл бұрын
exactly what I was thinking. 95-98% of websites I have seen do not display SQL back to the user on the bottom or in the browser console. there have been some exceptions, this is why it's not 100% but to cover just that case only in a video is a weak idea. so the examples are not realistic. for learning it's ok but for a realistic example, it's not even close to how the real world works 🤷♂️
@tojogamer17333 жыл бұрын
@@stevema2 You can still encounter some real world applications that suffer from sqli. If the devs are lazy and do not use input validation or/and prepared statements, you may end with an sqli. You don't have to get an obvious sql syntax error to exploit it, some times ou may get a 500 internal error that may be indicative of an sqli. Still, devs are more aware of these issues these days, they use also frameworks that embeds already sqli protection routines. that's why saying "Any website" is misleading good sir Loi Liang Yang
@stevema23 жыл бұрын
@@tojogamer1733 totally with you. you and I are saying the same thing different ways, just that I haven't seen many web apps where I see a SQL statement being written back to the browser console or in an HTML div. That was my point. There are exceptions but it's not as common which is not "Any website" 😉
@rofco52013 жыл бұрын
@@DirePantsDim there are some new websites who still suffer from sqli
@JohnWalz973 жыл бұрын
Only works for old fashioned PHP-based applications for the most part. There's still quite of few of those out there don't get me wrong. But it is going to be very hard to find any website worth hacking that's still vulnerable to SQL injection.
@lucianjohr5569 Жыл бұрын
Thanks so much Loi. This is awesome content.
@309-28游竣宏2 жыл бұрын
Thank you so much Loi! Your info is extremely valuable for beginners who are trying to make their websites slightly more secure.
@necronomicon-xmortis93622 жыл бұрын
impressive truely a master programer Salute...😎
@Mr.Hoque.11 ай бұрын
Which command you use to go the word list at 05:02 sec
@BambiOnIce19 Жыл бұрын
Compared to the mischief i used to get up to 20 years ago, can i just say this is absolutely WILD stuff. So, so very tempting....😬
@DiegoSilva-dv9uf Жыл бұрын
Valeu!
@abrarmomin91213 жыл бұрын
ypu are my best mentor love your videos you deserve subscribe
@Soda-stream3 жыл бұрын
Nice bro, i have so much learnee from you!!!!
@harkeBalBahadur3 жыл бұрын
Using parameterized statement would help in sql injection prevention. Also, limiting the permission of the type of DB user would help too. Why should a normal user be granted permission to show all the tables? 🤓
@jean-pierrethievenaz6935 Жыл бұрын
Hi, I need good databases about Spain for a project. I also want to join a good group of harckers to buy tools. THANKS
@stuffedcode3 жыл бұрын
Great insight and explanation on SQLI! This is great!
@MuhammadAhmad-hq5zx3 жыл бұрын
Thank so much I have searched alot for an excellent channel like this And I want to ask you if you could expand a lot and deep hacking on the future videos I don't want to use this for evil All what I need is to practice and have a good job Keep going I wish you a happy life 💓💓
@thongnieducationalinstitut8646 Жыл бұрын
You have got 1 new subscriber from me
@vz77423 жыл бұрын
Very easy to follow and understand,thank you very much.
@sanskar63233 жыл бұрын
Love you bro ❤️❤️❤️
@Vuttu1213 жыл бұрын
Ye chaca idhar bhi☹️☹️☹️☹️
@Alain9-13 жыл бұрын
can't believe why this channel has only 261k subscribers
@cesarnoriega85078 ай бұрын
Good eve Loi: I better start studying your videos thanks I learned something tonight it sounds interesting about SQL injection. I just heard it but not quite sure. Anyway thank you Cesar N.
@abdulnafay723 жыл бұрын
Well entire video goes over my head.
@waifufx3 жыл бұрын
Wow so glad I joined your channel
@tanmoydas25443 жыл бұрын
Thank you sir, we need more classes!!
@محمدالمالكي-ت9ص9ظ3 жыл бұрын
if i was using windows 7 without internet connection and just playing spyder solitaire what would that mean for hackers?
@anotheraussiebattla2333 жыл бұрын
that is what a hacker would call an "air gapped pc" they use similar security measures for highly protected data 1 authorised specialist at a time only transferring data using usb etc only way into a system like that is maybe bribe the computer specialist that has access to insert a usb download the data onto it get it back and open it when you get back to your pc :)
@factunknown03 жыл бұрын
You are really awesome lecturer. Tysm for tutorial. Love you sir..😊💐💐
@Timur_channel973 жыл бұрын
amazing sir. from Indonesia
@Born2DoubleUp3 жыл бұрын
I literally watch your videos to help secure a web based game I'm making. I have no experience and know people will find ways to cheat the game or take it offline. Ive been using your tricks to clean my code.
@slicker12602 жыл бұрын
what programming languages did u use to make the game ? and are u self taught ? or went to school to learn? if so what online free resources did u use to learn all that. Thanks :)
@ahmedbahaj87862 жыл бұрын
@@slicker1260 Nobody have the same route towards being a good developer, I tell u what try youtube, coursera, udemy, udacity and just see what suits you, also learn and APPLY don't just learn.
@chromeheartsonme Жыл бұрын
@@ahmedbahaj8786 the learn and apply part is some of the best advice you couldve offered, i took a programming class back in the day, and after i was done with the class i didnt really do anything with the knowledge i gained, so i forgot a decent amount of what i was taught. had to go to another programming course to make sure i was job ready haha.
@HusseinAyeni3 ай бұрын
congrats bro,you got 1m
@bellaboi47733 жыл бұрын
Using the information will takes you to the the right way for more information
@ZaKat_Thuan3 жыл бұрын
That’s perfect !! Thanks ❤️❤️❤️❤️
@emmanuelochubili2 жыл бұрын
Hello @Loi Liang, thanks for this tutorial.. but i would like to say, how effective is SQLi on react,and node js apps ?
@cesarnoriega850723 күн бұрын
Hi Loi I have a question. Would you tell me how to stop a pishing on my iPhone and my computer ? I know there are thousand programs for. I have been looking your vide on SQL Inyection is a good video. I want a suggestion as you for a recommendation. Thank you Cesar Northern California
@bazlar82103 жыл бұрын
Great video, could you do a tutorial on John the ripper please?
@viktor2000853 жыл бұрын
Online manual is a good place to start
@tsionwilliamson13853 жыл бұрын
Thats why when you run sql injection you need multiple zombies or to run a script that randomizes ip or both so the servers firewall wont trip at the sheer amount of data coming from one computer
@curtisdesler21003 жыл бұрын
You're a pro Boss Loi Liang Yang
@phillipruiz50892 жыл бұрын
Love the way you explain things ..keep up the info
@shikitono7953 жыл бұрын
Good morning sir Loi what tools did you use?
@tashijawed54723 жыл бұрын
Hey man, can you make a playlist for all the videos that a noob can watch to learn, like literally someone who just decided to start and completely new to all these jargons, like literally teaching a newbie.
@alessandrodimilla84503 жыл бұрын
Study CSS, C+ and java
@futureboyy44223 жыл бұрын
as a beginner everyone will tell you do this do that ! ... but man you have to figure it out by yourself whether you google or watch you tube videos
@parwezanwer3 жыл бұрын
Thank you very. A very very important and informational video learned good things.
@johnfilhmarola5440 Жыл бұрын
would this tutorial be a begginer for testing a solo project websites for any vulnerabilities of a said project?
@super7ace Жыл бұрын
it worked, it worked. thank you so much.
@sidewinder47023 жыл бұрын
Informative and scary at the same time.
@sidewinder47023 жыл бұрын
@Jonathan Dahan The part of your statement "without needing to know what's going on behind the scenes" is the part I am concerned with. I will also add if everything is so secure why the need for PEN testing in the first place? I get the fact that majority of the vulnerability's are cause by the end user. You would think people who head up IT security would be more aware of the simple stuff.
@sidewinder47023 жыл бұрын
@Jonathan Dahan It would be safe to say then that pen-testers will always be needed to some extend in the industry for the foreseeable future? As with everything computer related I just state don't download anything from an unknown source. Keep software up to date and use anti virus. And the biggest one I constantly say back up your data!
@tysanders4666 Жыл бұрын
This was very helpful thANKH you.
@biggur5 Жыл бұрын
hi Im a complete novice just starting out learning about pen testing. at 3:51 you have entered '1'='1' but is that any different to ' 1=1-- ? i've done a very basic course and thats what was demonstrated. I do apologise if ive asked a very novice question but I am from a completely different field of expertise. Thanks in advance
@daophilac1 Жыл бұрын
It doesn't matter whether it's a 1 or a 2, it's a character or a number. Here what we're trying to achieve is getting a query whose where clause WILL always be true if there is a username called tom. So it's not that you HAVE TO type '1'='1' or '1=1-- or whatever. You can just type something that is definitely true like '2''69'. Of course that will be true because 2 is different than 69. I hope you have covered that. Because that's the essential part. About your question whether '1'='1' is any different than '1=1--. Well, it IS indeed different but it's not a correct question to ask. It's more meaningful if you asked why '1=1-- is true. Or why it also works. It works because if you know about querying data using sql, you will know that -- is a special mark that lets the database engine know that it should ignore everything from that mark to the end of the line. In programming, we call it "commenting" For example, select * from users where username = 'tom' -- Trying to get a user whose username is tom In the above example, the "-- Trying to get a user whose username is tom" is just a comment part, a note part that the developer writes down to make it clear what's he trying to do so other developers understand the query when they read it for example. In any case, the computer will just ignore that whole part. So, the other course that you were learning might be attempting something that looks like: select * from users where username = 'tom' or 1 = 1-- It will result in the same result as the one in this video. A small technical detail that you might be interested in is that the number 1 in this case is a number because it isn't surrounded by single quotes. Whereas the number 1 in this video is a text, because it is surrounded in single quotes. But it doesn't matter in the scope of this dicussion. On a side note, that -- part isn't even needed if you have understood what I've told you so far. Sorry for my bad English by the way.
@biggur5 Жыл бұрын
@@daophilac1 thankyou for your reply. Yes I understand 1=1 or 3=3 but it was the two dashes I was unsure of but you have explained it. Thankyou
@macbook65073 жыл бұрын
Thanks our beloved lecturer ♥️
@gouravkhator3 жыл бұрын
Can you explain in depth how that payload actually fits in the sql query, by commenting other parts of the query? I am a beginner here, can understand some parts not full..
@n92 Жыл бұрын
Awesome. Thanks so much Liang Yang :)
@ajimak91702 жыл бұрын
It's is easy to understand,very good
@fazeaira88153 ай бұрын
how did you get how the application talk to the database text ?
@1J03B3 жыл бұрын
isnt all sql injection prevented by parameterized queries
@braunXYZ3 жыл бұрын
Depends how you define that. You cannot modify the query. But you can still inject shit into the database, that should not be there and that might be evaluated later. Javascript for example.
@andrew82932 жыл бұрын
This is why I prefer PDO over mysqli. PDO is so much harder to inject with.
@Deezeone3 жыл бұрын
Thank you !! You made me curiuos
@elliotalderson29893 жыл бұрын
how to setup the brick web application in kali linux? Does anyone have tutorials about it ?
@제작자납신다3 жыл бұрын
Cool, profesional, straight to the point. perfect.
@fm0x12 жыл бұрын
Amazing video tutorial! Thanks you so much. I'm currently studying Web Application Penetration Testing. It was very useful for me! Get your Like!
@sergeyk55179 ай бұрын
Hi, man, thanx for vid, could you explain where did you get sql select command, I mean where is it possible to see this command to DB from website?
@AlexPeres11 Жыл бұрын
wow, you're genius! great, thanks
@nekoda93793 жыл бұрын
Hey there, I'm kinda new to the ethical hacking world. Would like to ask how did that SQL query appears there at 2:00 ?
@kewondwego88603 жыл бұрын
It appears because it firstly appears in your mind
@jimjmcd3 жыл бұрын
Wow-- a thirty-minute presentation in 13 minutes!
@svetlanamazhaykina69183 жыл бұрын
Thank you Loi and keep up the good work!
@TOMA-ny7gg2 жыл бұрын
Great video Please can u explan from where to start to be hacker?
@Oldladywithastick2 жыл бұрын
I think he already made a video. But you could start with hackthebox or tryhackme if you want to look if its the right thing for you
@mr.roboter2 жыл бұрын
Thanks for Mr Yang. Can I have a question? How can I bypass Sqlmap TLS errer?
@abdosalah29523 жыл бұрын
Perfect ! 👍
@SilentSolution3 жыл бұрын
Thanks for your information and cooperation sir
@abiudokiring20556 ай бұрын
Loi I have a question about reverse engineering in android,,,,,how possible is it guarantee to bypass apps functions?
@mdasadansari32953 жыл бұрын
Which software you used to record the scree
@Hkfcbkl Жыл бұрын
Thank you , as a student of sql I see how could this language be used
@StevenMeloso Жыл бұрын
is there a webiste we can use to try these things out?
@Sauvenil2 жыл бұрын
How well do filter_input and filter_var in PHP protect against these?
@gamingg-p8r3 жыл бұрын
good work bro..following suit.
@slaitechnology3 жыл бұрын
do you have any idea some application only can install single computer , and how to it system work ?
@SmartInsightsPoint Жыл бұрын
whic terminal you use?
@chanceleram3 жыл бұрын
you´re awesome man, thanks for sharing.
@halusch87632 жыл бұрын
Dear Loi , there is one thing I really did not understand , first you enter the webpage that you want to SQL inject which is Bricks. You click Login, several login boxes. you just click the first one. when you random enter a name and password. Eventually it gives down below a "SQL QUERY " , you open a terminal and just put that QUERY from the page and paste it. How is that possible you just paste a text and suddenly there is connection between webpage (bricks) and your terminal. then open kali terminall you do this on kali according to the`1` = `1 this code gives you the possibility to log in and also SQL QUERY comes once again down below after you logged in , because you never entered anything about webpage how kali recognized that which page you are trying to do the SQL Injection? at the beginning you did not also enter any IP or something into kali? I d be happy if you could explain Thank you.
@LoiLiangYang2 жыл бұрын
You need to target the input field where it is vulnerable. It is vulnerable when the website is giving a response which is different from an expected input.
@halusch87632 жыл бұрын
@Loi Liang Yang Thank you, I try better, still could not manage thou. I wanted ask there is other membership, what's content difference in between Cybersecurity course and fullcybersecurity?