SQL Injection - Lab #17 SQL injection with filter bypass via XML encoding | Short Version

  Рет қаралды 21,122

Rana Khalil

Rana Khalil

Күн бұрын

In this video, we cover Lab #17 in the SQL injection module of the Web Security Academy. This lab contains a SQL injection vulnerability in its stock check feature. The results from the query are returned in the application's response, so you can use a UNION attack to retrieve data from other tables.
The database contains a users table, which contains the usernames and passwords of registered users. To solve the lab, perform a SQL injection attack to retrieve the admin user's credentials, then log in to their account.
▬ ✨ Support Me ✨ ▬▬▬▬▬▬▬▬▬▬
Buy my course: academy.ranakh...
▬ 🔗 Links 🔗 ▬▬▬▬▬▬▬▬▬▬
Notes.txt document: github.com/rkh...
Web Security Academy Lab Exercise: portswigger.ne...
Rana's Twitter account: / rana__khalil

Пікірлер: 16
@RanaKhalil101
@RanaKhalil101 Жыл бұрын
📚📚 Don't want to wait for the weekly release schedule to gain access to all the videos and want to be added to a discord server where you can ask questions? Make sure to sign up to my course: bit.ly/30LWAtE
@mohmino4532
@mohmino4532 11 ай бұрын
an amazing explain SQLi i've found till now and i noticed that women have amazing way to explain so thx so much my teacher اجمل تحية اليك استاذتي العزيزة
@paco6266
@paco6266 Жыл бұрын
Felicidades Rana 👏👏👏👏. No sé porque lo he visto, pero me ha encantado (Voy 2 video lab1, pero no sé lo digas a nadie, de verdad, que me da vergüenza 😂😂). Ahora en serio, me voy a poner como meta, visualizar, asimilar y practicar desde CERO. De verdad, ver este video me ha devuelto de nuevo la ilustración. MUCHAS GRACIAS.
@narsimharao8565
@narsimharao8565 Жыл бұрын
Thank you soo much for making valuable videos 🎉
@acronproject
@acronproject Жыл бұрын
Thanks Ms.Khalil. It's very useful for me.💐
@huyha3684
@huyha3684 Жыл бұрын
Can you explain the purpose of using encode "hex_entities"? I have tried using a different encoding method, but the results are not what I expected.
@786min
@786min Жыл бұрын
Thank you for this video you helped me so much! How did you get so good at pentesting and learn all this? I'm trying to get to your level iA
@vilma-lima5295
@vilma-lima5295 Жыл бұрын
muitoo bommm
@muhannedbelaid8849
@muhannedbelaid8849 Жыл бұрын
Thank you Rana.! Really appreciate what you are doing for the community ❤.
@irfanhameed5613
@irfanhameed5613 5 күн бұрын
great resource but audio is not comfortable
@FaizanPirjada-h1n
@FaizanPirjada-h1n Жыл бұрын
how we can find the sql vulnerability
@suguop123
@suguop123 Жыл бұрын
👌👌
@mukoshmanob9240
@mukoshmanob9240 Жыл бұрын
Can you please upload xss video and sql in post based and header based
@FaizanPirjada-h1n
@FaizanPirjada-h1n Жыл бұрын
Hello mam
@mistacoolie8481
@mistacoolie8481 Жыл бұрын
liquid gold. thank you
@aerrrdd885
@aerrrdd885 Жыл бұрын
helIo sorry to bother you, i have an exam in web security and I'm having some difficulties. I'd like to know if it's possible to get some help on this code. I think I know that there is an xss flaw on the password field because the "htmlspecialchars" function is only used on the user variable but when I put alert("hack")in the password field it doesn't return anything I don't understand why at all can you help me please i really in trouble with this require_once 'include.php'; $msg = ""; if( isset( $_POST[ 'username' ] ) && isset( $_POST[ 'password' ] ) && isset( $_POST[ 'password2' ] ) ) { checkToken( 'register.php' ); $user = $_POST[ 'username' ]; $pass = $_POST[ 'password' ]; $pass2 = $_POST[ 'password2' ]; if ( $pass !== $pass2) $msg = "Passwords don't match."; else { $stmt = $db->prepare("SELECT * FROM users WHERE username = ?;"); $stmt->bind_param("s", $user); $stmt->execute(); $result = $stmt->get_result(); if( $result && $result->num_rows >= 1 ) { $msg = "Username is not available."; } else { $user = stripslashes( $user ); $user = htmlspecialchars( $user ); $user = $db->real_escape_string( $user ); $pass = stripslashes( $pass ); $pass = $db->real_escape_string( $pass ); $stmt = $db->prepare("INSERT INTO users (username, password) VALUES (?,?);"); $stmt->bind_param("ss", $user, $pass); $stmt->execute(); redirect( 'login.php' ); } } Thanks in advance.
Officer Rabbit is so bad. He made Luffy deaf. #funny #supersiblings #comedy
00:18
Funny superhero siblings
Рет қаралды 19 МЛН
Стойкость Фёдора поразила всех!
00:58
МИНУС БАЛЛ
Рет қаралды 7 МЛН
啊?就这么水灵灵的穿上了?
00:18
一航1
Рет қаралды 54 МЛН
버블티로 부자 구별하는법4
00:11
진영민yeongmin
Рет қаралды 18 МЛН
SQL Injection Attack Tutorial - I didn't know you can do that
12:59
Loi Liang Yang
Рет қаралды 37 М.
SQL injection with Filter Bypass via XML Encoding
20:06
Intigriti
Рет қаралды 9 М.
Hacking Websites with SQL Injection - Computerphile
8:59
Computerphile
Рет қаралды 2,4 МЛН
Blind SQL Injection Made Easy
11:39
The Cyber Mentor
Рет қаралды 33 М.
CSRF - Lab #1 CSRF vulnerability with no defenses | Short Version
11:41
SQLc is the perfect tool for those who don't like ORMs
28:11
Dreams of Code
Рет қаралды 62 М.
you need to learn SQL RIGHT NOW!! (SQL Tutorial for Beginners)
24:25
NetworkChuck
Рет қаралды 1,6 МЛН
Officer Rabbit is so bad. He made Luffy deaf. #funny #supersiblings #comedy
00:18
Funny superhero siblings
Рет қаралды 19 МЛН