SQL injection with Filter Bypass via XML Encoding

  Рет қаралды 9,849

Intigriti

Intigriti

Күн бұрын

Пікірлер: 20
@jahmaijones3353
@jahmaijones3353 Жыл бұрын
Best explanation about how to do this on KZbin, thank you
@intigriti
@intigriti Жыл бұрын
🙏🥰
@real.xplo1t
@real.xplo1t Жыл бұрын
I think proxying the traffic through burpsuite and using match and replace rules would fix the ampersand encoding issue
@intigriti
@intigriti Жыл бұрын
Good idea!
@KL-og8gg
@KL-og8gg Жыл бұрын
love the debug one...good job
@g30rgyth3d4rk
@g30rgyth3d4rk Жыл бұрын
Incredible video 😊, definitely learned a lot.
@JoaquinRamirez
@JoaquinRamirez Жыл бұрын
Great bout troubleshooting, overall great information thanks
@intigriti
@intigriti Жыл бұрын
Thanks for watching! 💜
@AyushKumar-hv2ww
@AyushKumar-hv2ww Жыл бұрын
Nice lecture and explanation ❤️
@intigriti
@intigriti Жыл бұрын
Glad you liked it! 🥰
@juanmassad2015
@juanmassad2015 Жыл бұрын
Very nice video! The python scripts sends the payload to productID, but the vulnerability was in storeID, i think this would solve the issue with sqlmap not finding the vulnerability.
@intigriti
@intigriti Жыл бұрын
Hey, thanks! SQLMap will actually try each possible parameter *but* you can manually specify the correct one by adding an asterisk beside it (storeID in this case). It will save some time but unfortunately the issue with the encoding of tamper payload was still an issue. Somebody did identify the issue: twitter.com/_0x999/status/1615054152291258385. I made the change and re-tested and SQLMap worked perfectly 🔥
@user-kn6xz8lc6d
@user-kn6xz8lc6d Жыл бұрын
Thanks! Really nice to see you trying to debug that shit.. I got to this video because Bing AI recommended it to me when I asked him how to do this lab without using the hackvertor extension. I like manual stuff rather than ready-to-use stuff. And finally I could do it all from my browser without even using Burp.. I hesitated to fire up my kali, I was lazy and got stuborn to do right from my browser! lol
@intigriti
@intigriti Жыл бұрын
Awesome! Glad you enjoyed 😊
@eduardprivat9821
@eduardprivat9821 4 ай бұрын
mate...your rapid mouse movements are anoying =/. make them plz clear, because i look each time to dont miss something id you try to explain. rotate slowly over that region would also works and dont took too much attention from us. thx for your great videos :)
@intigriti
@intigriti 4 ай бұрын
Yeh sorry about that, I tend to rapidly move my mouse when I'm thinking 😣
@WtfAnupam
@WtfAnupam Жыл бұрын
Nice explanation
@intigriti
@intigriti Жыл бұрын
🙏🥰
Limit Overrun Race Conditions
11:28
Intigriti
Рет қаралды 4,8 М.
How to Fight a Gross Man 😡
00:19
Alan Chikin Chow
Рет қаралды 15 МЛН
FOREVER BUNNY
00:14
Natan por Aí
Рет қаралды 29 МЛН
Players push long pins through a cardboard box attempting to pop the balloon!
00:31
Из какого города смотришь? 😃
00:34
МЯТНАЯ ФАНТА
Рет қаралды 2,5 МЛН
How To Search For DOM-Based XSS!
9:37
Intigriti
Рет қаралды 50 М.
Time-Based Blind SQL Injection!
12:17
Intigriti
Рет қаралды 22 М.
Web Shell via Denylist Bypass!
9:05
Intigriti
Рет қаралды 20 М.
Blind SQL Injection Made Easy
11:39
The Cyber Mentor
Рет қаралды 35 М.
XSS to RCE? CrossFit by Hack The Box
26:54
Intigriti
Рет қаралды 16 М.
BYPASS this Tricky SQL Injection Filter - Billu Walkthrough Ep2
12:02
Bypassing SQL Filters (picoCTF Web Gauntlet)
14:06
The Cyber Mentor
Рет қаралды 44 М.
How to Fight a Gross Man 😡
00:19
Alan Chikin Chow
Рет қаралды 15 МЛН