SQL Injection - Lab #1 SQL injection vulnerability in WHERE clause allowing retrieval of hidden data

  Рет қаралды 75,675

Rana Khalil

Rana Khalil

Күн бұрын

Пікірлер: 123
@RanaKhalil101
@RanaKhalil101 3 жыл бұрын
Interested in supporting me and gaining early access to the Web Security Academy videos when they're recorded? Consider buying my course: academy.ranakhalil.com/p/web-security-academy-video-series! ✨ ✨
@Dj-jh3dy
@Dj-jh3dy 2 жыл бұрын
What are the pre requisites for this course..can you suggest some learnings to do before doing this series because I see python coding in the second part of the video
@anputhegod246
@anputhegod246 3 жыл бұрын
I love how she teaches. There is not that many good teachers in cyber security, that will take there time and go step by step in the process of what is going on in coding or troubleshooting to gain control in with certain tools. I salute her and her patients with us all. She is one of my favorite Like Heath Adams (Cyber Mentor), John Hammond, InsiderPHD katie, IT Security Labs guy, Tib3rius, STOK and Nahamsec
@jackschwimmer7455
@jackschwimmer7455 3 жыл бұрын
I’ve seen many tutorials and even paid courses that don’t get even closer to the quality of this video. Thanks for sharing this for people who are just starting out. Really appreciated
@whatever32135
@whatever32135 3 жыл бұрын
This series is great. And I really appreciate the scripting section
@afsarriyan7395
@afsarriyan7395 3 жыл бұрын
IMO.. this is the best approach !! Programming is an inevitable skill for a successful pentest career. Nailed it !! Very much excited for rest of series.
@charlesvijayanand
@charlesvijayanand 3 жыл бұрын
Perfectly explained! I don't think this can be explained better than this one. Thanks
@thientrinh1618
@thientrinh1618 2 жыл бұрын
this series is very helpful, it is an exciting course, and this is what I need, many thanks
@aryan_shorts812
@aryan_shorts812 Жыл бұрын
The art of automating the attack's stunning🎉
@chung_myung.
@chung_myung. 3 жыл бұрын
I found your channel today, the way you explain is awsm😍😍😍. Thank you for explaining soo clearly mam. Please make more videos mam on different topics too😅
@ameerhamza4017
@ameerhamza4017 3 жыл бұрын
100 percent as per my demand....thanks... Dear Viewer, don't forget to share this amazing video, and give her positive feedback for hard work.
@sandunifernando8191
@sandunifernando8191 3 жыл бұрын
This is Great. I don't have enough words to thank you. You saved me. Excited for rest of the series.
@vijayshreenivos9417
@vijayshreenivos9417 3 жыл бұрын
I watch @ippsec tutorials for my lunch&learn skills development ; now your videos will become the secret sauce for my documentation and scripting technique. excellent work , looking forward to see more
@dr14nHOK
@dr14nHOK 5 ай бұрын
i started learning portswigger labs and i found this vid is extremely helpful. tysm for making this content❤
@SumanthRao-gj5zk
@SumanthRao-gj5zk 3 жыл бұрын
I was struggling for a long time for a video like this video.Thanks
@Pr4547h
@Pr4547h 3 жыл бұрын
Hi madam, Your way off teaching are awesome..!! (Theory,practical & scripting) Happy women's day 🎉❤️🙏
@RanaKhalil101
@RanaKhalil101 3 жыл бұрын
Thanks!
@sakshamdoshi9064
@sakshamdoshi9064 2 жыл бұрын
You belong to people who we subscribe getting impressed, well deserved
@oscarromero1007
@oscarromero1007 3 жыл бұрын
Gracias por los vídeos, son maravillosos!! Y la explicación para hacer los scripts en python está genial, muchas gracias.
@prisonmike8681
@prisonmike8681 2 жыл бұрын
Best pen testing course ever!
@ameerhamza4017
@ameerhamza4017 3 жыл бұрын
Maam, my honest suggestion: please add practical Hands-on Lab. This will help us a lot. Otherwise internet is full of theoritcal material like slides and pdf. So kindly, focus on Core and practical Hands-on operations in every Web-Security videos series. Thanks..... a lot of love and respect...
@RanaKhalil101
@RanaKhalil101 3 жыл бұрын
I would recommend watching the intro video: kzbin.info/www/bejne/fZWwha2Zo5p5ZsU. It clearly says that there are both theory and lab videos and this video is going to be a lab (practical) video. In fact, the next 16 videos will be lab videos that have practical hands on exercises.
@sajidalam1989
@sajidalam1989 3 жыл бұрын
@@RanaKhalil101 Thank you for your hard work
@ameerhamza4017
@ameerhamza4017 3 жыл бұрын
@@RanaKhalil101 jazak ALLAH.
@mostafasayed2783
@mostafasayed2783 10 ай бұрын
جزاكى الله خيرا ونفعك وزادك من فضله فى الدنيا والاخرة بأذن الله
@s7rix894
@s7rix894 3 жыл бұрын
You're a pro ! Good job and thanks for the video
@ayodub
@ayodub 3 жыл бұрын
@14:00 is really cool. I've made a bunch of web fuzzers in python, but have never seen the proxy thing done.
@apratimtripathi3403
@apratimtripathi3403 Жыл бұрын
Being third person we will be completely unknow of what is going to release then how can we write a script for that ? Here you knew that cat grin will be there but not in every case you know something.
@giftonpaulimmanuel146
@giftonpaulimmanuel146 2 жыл бұрын
congrats on 30k
@makkinongeri8604
@makkinongeri8604 3 жыл бұрын
Salam Aleikum, I am a Muslim from Russia studying for Information Security. I am very happy for this sister and wish her every success.
@watchandgainknowledge
@watchandgainknowledge 3 жыл бұрын
what what what an amazing explanation you've given to us in free of Cost.... I hope you'll not *Private/OnlyMe* these Videos
@saivaste9686
@saivaste9686 11 ай бұрын
Just a small query. Since we were able to add payload in the browser itself where showed that there is something called "Cat Grin" which we used as payload. But in real-life, we won't be able to get those. In such cases what would be our key in place of Cat Grin. Awaiting your revert.
@retr0960
@retr0960 Жыл бұрын
Why we used Cat Grin
@alexanderfriis7375
@alexanderfriis7375 2 ай бұрын
How do you access the lab in the terminal? In the script section of the video.
@mukoshmanob9240
@mukoshmanob9240 3 жыл бұрын
nice speech.keep it up mam and give us more information
@eclipseinsight
@eclipseinsight 3 жыл бұрын
Eagerly waiting for this...
@Mike01010011
@Mike01010011 3 жыл бұрын
Me too
@dxsp1d3r
@dxsp1d3r 3 жыл бұрын
Nice Initiative Rana Khalil
@kusharora1435
@kusharora1435 2 жыл бұрын
this is super awesome.. and exactly what i needed. thank you so much, Rana.. you are a gem
@rahulbhichher2478
@rahulbhichher2478 3 жыл бұрын
Thankyou for this great playlist on SQLi... Waiting for more. ❤️
@saeedlafi7888
@saeedlafi7888 Жыл бұрын
الله يعطيك العافيه شرحك اسطوري
@joaquimmenezes7396
@joaquimmenezes7396 3 жыл бұрын
Definitely loved ur content would like more videos on other topics on portswigger
@wadallace
@wadallace 2 жыл бұрын
Really great video - thank you for taking the time to share this with us. The question I have is related to the scripting. In theory, the point of scripting would be to automate the process instead of doing it manually. As you wouldn't know there was a hidden product for the Cheshire Cat unless you had already succeeded in the injection, then I'm confused as to why we would add that to the script that's supposed to tell us whether or not the injection was successful? How would we write a script that tells us if it's successful or not without already having that information?
@IAmScarab
@IAmScarab Жыл бұрын
Same observation and question myself.
@mynameisrezza
@mynameisrezza Жыл бұрын
Maybe I'd rather use sqlmap :)
@rajneeshkumararya3643
@rajneeshkumararya3643 Жыл бұрын
I am getting the concept, and it is beautifully explained, but where can I learn this scripting this is the only thing I'm lagging here.
@maheeadnan3610
@maheeadnan3610 2 жыл бұрын
Thank you for these videos . i appreciate the way you teach us.
@SangharshSeth
@SangharshSeth 3 жыл бұрын
Greate Video. on top of that scripting the attack made the exploit even more clear.I just have one question . When you wrote script for the attack for checking if its successful you used something which we got from manually exploiting the app i.e the Cat string. Can you give another method to check the attack when we did not manually found the result. Hope my doubt was clear. Again thanks for the video
@sutty-ln5ww
@sutty-ln5ww 2 ай бұрын
@SangharshSeth - I am new to this but I believe you can print the entire response in r.text and update the script accordingly based on the response you get.
@Car17138
@Car17138 2 жыл бұрын
amazing video i like your coding skill ma'am
@_CryptoCat
@_CryptoCat 3 жыл бұрын
Great vid Rana, keep it up! :)
@kashyapsugandh7319
@kashyapsugandh7319 Жыл бұрын
Thank you so much for the amazing video Rana! Had to ask what extension did you use in vs code?
@Cruisin_In_Comfort
@Cruisin_In_Comfort 2 жыл бұрын
Great content. How come you do not use the browser built into Burp ? Is there a reason to use foxy proxy instead ?
@surojitmaity2397
@surojitmaity2397 Жыл бұрын
perfect explanation!
@0xfsec
@0xfsec 3 жыл бұрын
MashaaAllah Great video.. I love the section writing exploit with python.
@prabhatmishra5667
@prabhatmishra5667 2 жыл бұрын
Can I only run the python code in Kali Linux? Or in windows it is possible?
@gyangaha109
@gyangaha109 3 жыл бұрын
Great Appreciation
@janricmalate6793
@janricmalate6793 3 жыл бұрын
Very well said. I learned a lot, looking forward for your future contents 😁. Thank you♥️
@archakpramanik1226
@archakpramanik1226 3 жыл бұрын
Plz make a detailed video on sensetive information disclosour
@armanmulani7453
@armanmulani7453 3 жыл бұрын
Love From India
@saurabtharu7252
@saurabtharu7252 3 жыл бұрын
what's there in r.text in function exploit_sqli(url,payload) when I did print(r.text) for trouble shooting, it printed "Not found" that's why while scripting it always says [-] SQL injection unsuccessful! even though link and payload both are correct
@raahilbadiani7289
@raahilbadiani7289 3 жыл бұрын
do check that u are not using / in the end of url that u r passing in the parameter. as that would ultimately send // in the get request.
@saurabtharu7252
@saurabtharu7252 3 жыл бұрын
@@raahilbadiani7289 thank you
@danweinman6999
@danweinman6999 3 жыл бұрын
Thank you for the informative content. What note taking and windowing/terminal app were you using?
@RanaKhalil101
@RanaKhalil101 3 жыл бұрын
Visual Studio
@dibyarupdas2130
@dibyarupdas2130 3 жыл бұрын
Hi Rana, firstly great work!! You have explained the things in such an elegant way. I am eagerly waiting for the upcoming videos. But I have one small query though. Since we are finding all the products of all categories, can we not comment out just after select * from products where it will select all the products? The query: select * from products -- where products = 'gifts/pets' and release = 1. So the query effectively executed by the website will be "select * from products". Please do throw some light on my doubt. Thanks.
@RanaKhalil101
@RanaKhalil101 3 жыл бұрын
It depends on where the injection point is. The vulnerable parameter in the URL is "category" and whatever gets entered in that field gets inputed in the where clause of the backend query "select * from products where category=". So you need to figure out a way to break out of the category field in the query and add SQL code to reach your end goal. You can't simply comment out the query after the products table (select * from products--) because that's not your injection point and you can't reach that from the category parameter in the URL. Hope that makes sense!
@dibyarupdas2130
@dibyarupdas2130 3 жыл бұрын
@@RanaKhalil101 Thanks got it. 👍
@DMRRFD
@DMRRFD 9 ай бұрын
hi rana , that is a great video and helpful but i have an error and i don't understand the reason Can u help me?
@Philippe3556
@Philippe3556 Жыл бұрын
Great video! Thank you!
@tamilincognito9291
@tamilincognito9291 3 жыл бұрын
Your content also very useful. More videos upload we are support your videos
@Don-ct7ok
@Don-ct7ok 2 жыл бұрын
How do I get the terminal to complete the lab?
@saichandtadepalli9154
@saichandtadepalli9154 3 жыл бұрын
amazing explanation
@DheerajKumar-kh1sl
@DheerajKumar-kh1sl 3 жыл бұрын
mam pls make playlist on other topics too
@jacobsamuel4092
@jacobsamuel4092 2 жыл бұрын
This is great work
@noureldinehab2686
@noureldinehab2686 3 жыл бұрын
excited for that💙
@algorithm3317
@algorithm3317 3 жыл бұрын
Thanks for all the awesome content! , God bless.
@johndudde7618
@johndudde7618 3 жыл бұрын
awesome! Thank you for share this tutorial!
@prisonmike8681
@prisonmike8681 2 жыл бұрын
Does anyone know why endless loading happens when I tried to perform a similar attack?
@rodrigoa.cascao1553
@rodrigoa.cascao1553 Жыл бұрын
Very good!
@issarihani
@issarihani Жыл бұрын
Hello Rana, Can you Please offer a course for the python programming that is needed for SQL injection
@steveerkel2970
@steveerkel2970 2 жыл бұрын
This is such a great explanation but the video is so blurry I cannot see what you are doing when modifying the URL
@RanaKhalil101
@RanaKhalil101 2 жыл бұрын
Go to the Settings icon on the bottom left of the video and make sure the Quality is set to 1080 HD.
@dgk0
@dgk0 3 жыл бұрын
This is a great video. could this go any quicker tho.. at this pace.. itll take more than two years to finish the labs
@UBHadidas
@UBHadidas Жыл бұрын
Good video!
@peantter
@peantter 3 жыл бұрын
😔 very thankful بوركتي
@ahmedelnaas2730
@ahmedelnaas2730 Жыл бұрын
thanks Rana
@PeretRed
@PeretRed 3 жыл бұрын
Great content !
@surojitmaity2397
@surojitmaity2397 Жыл бұрын
Hi Rana, I see your whole methodology is very nice. Do you provide any online classes for web pentesting. How to reach you in case need some career consultation on Cyber security.
@brahimchebli7781
@brahimchebli7781 3 жыл бұрын
شكرا من المغرب
@furyisfurious398
@furyisfurious398 Жыл бұрын
is this code run if we run through windows
@khai-vq5hn
@khai-vq5hn 11 ай бұрын
what vscode theme is she using
@elinamk12
@elinamk12 3 ай бұрын
very good
@crash9706
@crash9706 3 жыл бұрын
You don't recommend using sqlmap? Or will it not help in this situation
@RanaKhalil101
@RanaKhalil101 3 жыл бұрын
It definitely does help in this situation. However, using SQLMap is something that is easy to do / learn and that's why in my series I focus on manual exploitation.
@panachaiboonyoo1553
@panachaiboonyoo1553 Жыл бұрын
thank you
@bobbychase5616
@bobbychase5616 3 жыл бұрын
im ready to learn!
@yassers1893
@yassers1893 3 жыл бұрын
Helpful ,, thank you
@gurvirsingh4190
@gurvirsingh4190 3 жыл бұрын
Great mam
@RanaKhalil101
@RanaKhalil101 3 жыл бұрын
Hi everyone! I would really appreciate it if you could fill out the following feedback form after watching the video: bit.ly/38g0SdZ. Thank you!
@kylewonglee7724
@kylewonglee7724 3 жыл бұрын
Doesn’t work for me
@krisharora8774
@krisharora8774 8 ай бұрын
mam please make a playlist for python scripting , please.
@رجالالعصابات
@رجالالعصابات 3 жыл бұрын
good job , please zoom in so we can see what you are typing :)
@gisnebus5600
@gisnebus5600 2 жыл бұрын
Don't forget to hydrate!
@irsyadahmad8627
@irsyadahmad8627 3 жыл бұрын
may i know where to learn python scripting
@uionei9083
@uionei9083 2 жыл бұрын
I started learning from here, I want to be the best cybersecurity in the world, hehehe
@parthibanakt7090
@parthibanakt7090 2 жыл бұрын
Scripting section was great
@misterjordijey
@misterjordijey 6 ай бұрын
Using sql injection to buy items off commerce sites without paying anything
@Kingdd1os
@Kingdd1os 2 жыл бұрын
ALGORITHM
@mistacoolie8481
@mistacoolie8481 Жыл бұрын
🎊👍
@thecoder7984
@thecoder7984 3 жыл бұрын
14:25
@techboy0071
@techboy0071 6 ай бұрын
why just '-- is not enough
@ChetaN_07
@ChetaN_07 3 жыл бұрын
Hey Rana can I get your business mail
@muhammadabdullahdilshad8509
@muhammadabdullahdilshad8509 4 ай бұрын
I think there was no need of the python script.I think i am naive that i cant understand why she wrote a python querry for the simple task.
@KevoUltimo-jy5ko
@KevoUltimo-jy5ko Жыл бұрын
yo who tf need college :))
@iMshadab
@iMshadab 3 ай бұрын
Thank you
SQL Injection | Complete Guide
1:11:53
Rana Khalil
Рет қаралды 258 М.
Чистка воды совком от денег
00:32
FD Vasya
Рет қаралды 3,5 МЛН
Hacking Websites with SQL Injection - Computerphile
8:59
Computerphile
Рет қаралды 2,4 МЛН
SQL Injection For Beginners
13:28
Loi Liang Yang
Рет қаралды 1,5 МЛН
Command Injection | Complete Guide
32:07
Rana Khalil
Рет қаралды 38 М.
Pentesting Diaries 0x1 - SQL Injection 101
1:20:01
HackerSploit
Рет қаралды 34 М.
SQL Injection Attack Tutorial - I didn't know you can do that
12:59
Loi Liang Yang
Рет қаралды 40 М.