I really love that there is no music in the background, this helps more to concentrate on the video.
@Hobby_Technology3 жыл бұрын
THANK YOU! I was very stuck on a problem on a ctf for a class I'm in and this saved me.
@AnthonyMcqueen19873 жыл бұрын
Nicely explained straight to the point does help to find this vulnerability.
@VenkatakrishnanSampath Жыл бұрын
How does a ping/time delay command exploit or retrieve data from the database? In which scenario it is used? if a ping/time delay command is executed, how does it help an attacker?
@chritulkas5646 Жыл бұрын
it just tells to you that the attack was successfull and you can mount different attacks afterwards
@aarathim70234 жыл бұрын
Hi sir, i have a doubt.. The command injuction occurs when the program doesn't perform proper input validation, but how could it be possible, we will get a perfect output only if we have a perfect input 🧐but how 🤔.
@francescoscotti61892 жыл бұрын
because with injection you run also the correct input, but instead of running just the input, you run other command using the separator ;
@The_One_0_02 жыл бұрын
That is not the same thing
@The_One_0_02 жыл бұрын
Proper input validation is so of u use something such as ; & $ # + ' " etc u could then add on a system command returning the perfect response of the command
@The_One_0_02 жыл бұрын
Yea same as what guy before me said
@mojoxtreme3 жыл бұрын
great video, thanks guys!
@igu6422 жыл бұрын
Thank you!
@true_tamilan4 жыл бұрын
Great intro info
@kezzle96092 жыл бұрын
idk why you act like you're being held at gunpoint but thanks
@amongusboi2032 Жыл бұрын
Presuming the topic is serious or he has public speaking issues.