Ninja Hatori
Ninja Hatori
  • 19
  • 18 455
[Web Application Security] STEP BY STEP SQL INJECTION
A SQL injection attack consists of insertion or “injection” of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system
Переглядів: 153

Відео

[Web Application Security] STEP BY STEP SQL INJECTION
Переглядів 100Рік тому
A SQL injection attack consists of insertion or “injection” of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file syst...
[Web Application Security] STEP BY STEP SQL INJECTION
Переглядів 81Рік тому
A SQL injection attack consists of insertion or “injection” of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file syst...
[Web Application Security] STEP BY STEP SQL INJECTION PART 3
Переглядів 85Рік тому
A SQL injection attack consists of insertion or “injection” of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file syst...
[Web Application Security] STEP BY STEP SQL INJECTION PART 2
Переглядів 89Рік тому
A SQL injection attack consists of insertion or “injection” of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file syst...
[Web Application Security] STEP BY STEP SQL INJECTION
Переглядів 125Рік тому
A SQL injection attack consists of insertion or “injection” of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file syst...
How To Exploit Port 139 & 445 (SAMBA)
Переглядів 557Рік тому
In This Videos Learn How To Exploit Port 139 & 445 (SAMBA)
How To Hack Port 21 (FTP)
Переглядів 438Рік тому
In This Videos We Learning how to hack FTP using Metasploit.
[bug bounty] xss in nike.com
Переглядів 4985 років тому
Link medium : medium.com/@hninja049
[bug bounty] Stored XSS in https://www.bitcoinget.com
Переглядів 2,1 тис.5 років тому
XSS is a type of code injection attack. XSS is done by attackers by entering HTML code or other client script code into a site. This attack will seem to come from the site. As a result of this attack, among others, attackers can bypass security on the client side, get sensitive information, or store malicious applications. link medium : medium.com/@hninja049
[bug bounty] Sql injection via user-agent
Переглядів 3,5 тис.5 років тому
Sql Injection via the user-agent, how can this happen? well here what we need to know first is that the sql injection query that we normally use like order by 99 - - is useless we can no longer use, and here they have blocked important characters for like (‘ ’, “ ”, /, \,)etc. ok ... most applications usually record our user-agent and through user-agents we can do sql injection. medium : medium...
[bug bounty] Web For Pentester bypass WAF Sql Injection
Переглядів 5335 років тому
SQL injection is a code injection technique that might destroy your database. SQL injection is one of the most common web hacking techniques. SQL injection is the placement of malicious code in SQL statements, via web page input. medium : medium.com/@hninja049
[bug bounty] Web For Pentester Sql Injection
Переглядів 2195 років тому
SQL injection is a code injection technique that might destroy your database. SQL injection is one of the most common web hacking techniques. SQL injection is the placement of malicious code in SQL statements, via web page input. medium : medium.com/@hninja049
[bug bounty] Mulltiple Vulnerability
Переглядів 2725 років тому
target : www.kaizerpk.com/content.php?Id=3 medium : medium.com/@hninja049
[bug bounty] Advanced Sqlinjection
Переглядів 8 тис.5 років тому
SQL injection is a code injection technique that might destroy your database. SQL injection is one of the most common web hacking techniques. SQL injection is the placement of malicious code in SQL statements, via web page input. medium : medium.com/@hninja049
[bugv bounty] sql injection using sqlmap
Переглядів 2375 років тому
[bugv bounty] sql injection using sqlmap
[bug bounty] Stored XSS https://www.gameskinny.com POC
Переглядів 3275 років тому
[bug bounty] Stored XSS www.gameskinny.com POC
[bug bounty] self xss in komunitas bukalapak
Переглядів 1915 років тому
[bug bounty] self xss in komunitas bukalapak
[bug bounty] Step by Step Sql Injection
Переглядів 8805 років тому
[bug bounty] Step by Step Sql Injection

КОМЕНТАРІ

  • @ronburgundy1033
    @ronburgundy1033 Рік тому

    i got this error Exploit failed: Rex::Proto::SMB::Exceptions::NoReply The SMB server did not reply to our request [*] Exploit completed, but no session was created. what dose it mean

  • @dwilson9559
    @dwilson9559 Рік тому

    Promo'SM

  • @Soda-stream
    @Soda-stream Рік тому

    How did u now is in user agent? And nice vid bro , make other like this.

  • @leonardopanzieri3114
    @leonardopanzieri3114 Рік тому

    thank you so much, amazing video, i suggest to continue to do This type of video youre great

  • @DEADCODE_
    @DEADCODE_ Рік тому

    You wanna collaboration Brother

  • @Shanky..
    @Shanky.. 2 роки тому

    Verzeo guys came here ❤️❤️

  • @fazalshaik2540
    @fazalshaik2540 2 роки тому

    sir that particular link is not working\

  • @riaranti3083
    @riaranti3083 2 роки тому

    Bg kenapa pas nampilkan nama database atau table pada retrieved lama keluar hurufnya satu²

    • @EndisuKKJJ
      @EndisuKKJJ Рік тому

      Se você usa o SQLMAP é normal pois ele faz requisição por requisição, demora muitooooo, e faz um barulho imenso no servidor...

  • @AnthonyMcqueen1987
    @AnthonyMcqueen1987 3 роки тому

    That is pretty good.

  • @sreedeepcv866
    @sreedeepcv866 3 роки тому

    nice find 👍👍

  • @rakeshb3149
    @rakeshb3149 3 роки тому

    How did u get opportunity to do bug bounty on this site From hackerone,bugcrowd Or they created bug bounty program for themselves Or they invited you Please tell

  • @qj1eo
    @qj1eo 3 роки тому

    how did you know its in user agent

  • @upengan78
    @upengan78 3 роки тому

    Thank you . What is 0x3a please?

  • @kbto
    @kbto 3 роки тому

    help, when i try first step say The requested URL /who'+--+.html was not found on this server.

  • @zin_min_phyo
    @zin_min_phyo 4 роки тому

    POST base XSS -_-

  • @universal5172
    @universal5172 4 роки тому

    I need a hire hacker. Anybody els

  • @universal5172
    @universal5172 4 роки тому

    I want to hire of you...

    • @ninjahatori2599
      @ninjahatori2599 4 роки тому

      oh thank you, for the position junior security

  • @ahmedelmalky261
    @ahmedelmalky261 4 роки тому

    it 's just self xss bro !

  • @aviralgupta9869
    @aviralgupta9869 4 роки тому

    U r noob

  • @byronwiedeman4216
    @byronwiedeman4216 4 роки тому

    why did yo u change kelas =dewi ??

  • @MuhammadAhmed-tz9mr
    @MuhammadAhmed-tz9mr 5 років тому

    I have watched ur many many videos, those are complete and also easily understandable, Thanks

  • @lskteam7806
    @lskteam7806 5 років тому

    Why use ' +--+ ?

    • @BastosGraphics
      @BastosGraphics 5 років тому

      commenting the rest of the query out so that the third ' doesn't break the query.

  • @MuhammadAhmed-tz9mr
    @MuhammadAhmed-tz9mr 5 років тому

    Can u tell me automation testing via skype, teamviewer or whatsapp or messanger or discord or whatever u prefer

  • @MuhammadAhmed-tz9mr
    @MuhammadAhmed-tz9mr 5 років тому

    can u tell me any automation testing way?

  • @ALdMFbeat
    @ALdMFbeat 5 років тому

    Psti ga di kasih reward kan ?

  • @chivaljazz
    @chivaljazz 5 років тому

    Reflective xss . good work.

  • @slaxblake
    @slaxblake 5 років тому

    That's a reflected XSS my friend, not stored lol

    • @ninjahatori2599
      @ninjahatori2599 5 років тому

      sorry

    • @TNTpeoplenetwork
      @TNTpeoplenetwork 5 років тому

      I think you can't exploit it, if the server isn't vulnerable of CSRF. (Complicated reflected XSS 🙄)

    • @slaxblake
      @slaxblake 5 років тому

      @@TNTpeoplenetwork no, it is exploitable. @ninja hatori, did you reported it?

    • @ninjahatori2599
      @ninjahatori2599 5 років тому

      @@slaxblake I did not get a prize because of a duplicate

    • @ninjahatori2599
      @ninjahatori2599 5 років тому

      @@TNTpeoplenetwork ok

  • @oneeminem2666
    @oneeminem2666 5 років тому

    were you able to score a bounty?

  • @KharisKaban
    @KharisKaban 5 років тому

    Cmiiw. But isn’t it just a reflected xss?

  • @gamerskeren12
    @gamerskeren12 5 років тому

    Good

  • @0xAkash_Sarkar
    @0xAkash_Sarkar 5 років тому

    any bounty or hof?

  • @gamerskeren12
    @gamerskeren12 5 років тому

    waw emaizing