- 19
- 18 455
Ninja Hatori
Indonesia
Приєднався 2 кві 2019
Cyber Security Tutorial For Beginner
[Web Application Security] STEP BY STEP SQL INJECTION
A SQL injection attack consists of insertion or “injection” of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system
Переглядів: 153
Відео
[Web Application Security] STEP BY STEP SQL INJECTION
Переглядів 100Рік тому
A SQL injection attack consists of insertion or “injection” of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file syst...
[Web Application Security] STEP BY STEP SQL INJECTION
Переглядів 81Рік тому
A SQL injection attack consists of insertion or “injection” of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file syst...
[Web Application Security] STEP BY STEP SQL INJECTION PART 3
Переглядів 85Рік тому
A SQL injection attack consists of insertion or “injection” of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file syst...
[Web Application Security] STEP BY STEP SQL INJECTION PART 2
Переглядів 89Рік тому
A SQL injection attack consists of insertion or “injection” of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file syst...
[Web Application Security] STEP BY STEP SQL INJECTION
Переглядів 125Рік тому
A SQL injection attack consists of insertion or “injection” of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file syst...
How To Exploit Port 139 & 445 (SAMBA)
Переглядів 557Рік тому
In This Videos Learn How To Exploit Port 139 & 445 (SAMBA)
How To Hack Port 21 (FTP)
Переглядів 438Рік тому
In This Videos We Learning how to hack FTP using Metasploit.
[bug bounty] Stored XSS in https://www.bitcoinget.com
Переглядів 2,1 тис.5 років тому
XSS is a type of code injection attack. XSS is done by attackers by entering HTML code or other client script code into a site. This attack will seem to come from the site. As a result of this attack, among others, attackers can bypass security on the client side, get sensitive information, or store malicious applications. link medium : medium.com/@hninja049
[bug bounty] Sql injection via user-agent
Переглядів 3,5 тис.5 років тому
Sql Injection via the user-agent, how can this happen? well here what we need to know first is that the sql injection query that we normally use like order by 99 - - is useless we can no longer use, and here they have blocked important characters for like (‘ ’, “ ”, /, \,)etc. ok ... most applications usually record our user-agent and through user-agents we can do sql injection. medium : medium...
[bug bounty] Web For Pentester bypass WAF Sql Injection
Переглядів 5335 років тому
SQL injection is a code injection technique that might destroy your database. SQL injection is one of the most common web hacking techniques. SQL injection is the placement of malicious code in SQL statements, via web page input. medium : medium.com/@hninja049
[bug bounty] Web For Pentester Sql Injection
Переглядів 2195 років тому
SQL injection is a code injection technique that might destroy your database. SQL injection is one of the most common web hacking techniques. SQL injection is the placement of malicious code in SQL statements, via web page input. medium : medium.com/@hninja049
[bug bounty] Mulltiple Vulnerability
Переглядів 2725 років тому
target : www.kaizerpk.com/content.php?Id=3 medium : medium.com/@hninja049
[bug bounty] Advanced Sqlinjection
Переглядів 8 тис.5 років тому
SQL injection is a code injection technique that might destroy your database. SQL injection is one of the most common web hacking techniques. SQL injection is the placement of malicious code in SQL statements, via web page input. medium : medium.com/@hninja049
[bugv bounty] sql injection using sqlmap
Переглядів 2375 років тому
[bugv bounty] sql injection using sqlmap
[bug bounty] Stored XSS https://www.gameskinny.com POC
Переглядів 3275 років тому
[bug bounty] Stored XSS www.gameskinny.com POC
[bug bounty] self xss in komunitas bukalapak
Переглядів 1915 років тому
[bug bounty] self xss in komunitas bukalapak
[bug bounty] Step by Step Sql Injection
Переглядів 8805 років тому
[bug bounty] Step by Step Sql Injection
i got this error Exploit failed: Rex::Proto::SMB::Exceptions::NoReply The SMB server did not reply to our request [*] Exploit completed, but no session was created. what dose it mean
Promo'SM
How did u now is in user agent? And nice vid bro , make other like this.
thank you bro, please suport for my content
thank you so much, amazing video, i suggest to continue to do This type of video youre great
Thanks, will do!
You wanna collaboration Brother
yes
@@ninjahatori2599 give me your twitter
@@DEADCODE_ find me on telegram @kualakumal123
Verzeo guys came here ❤️❤️
thank's
sir that particular link is not working\
Bg kenapa pas nampilkan nama database atau table pada retrieved lama keluar hurufnya satu²
Se você usa o SQLMAP é normal pois ele faz requisição por requisição, demora muitooooo, e faz um barulho imenso no servidor...
That is pretty good.
thank you
nice find 👍👍
Thanks 👍
How did u get opportunity to do bug bounty on this site From hackerone,bugcrowd Or they created bug bounty program for themselves Or they invited you Please tell
how did you know its in user agent
Thank you . What is 0x3a please?
help, when i try first step say The requested URL /who'+--+.html was not found on this server.
POST base XSS -_-
I need a hire hacker. Anybody els
Here
yes i'm ready
@@s000sdas you can find my telegram @kualakumal123
I want to hire of you...
oh thank you, for the position junior security
it 's just self xss bro !
what do you know idiot
U r noob
why did yo u change kelas =dewi ??
I have watched ur many many videos, those are complete and also easily understandable, Thanks
thank you don't forget to like, share and subscribe.
please read my medium medium.com/@hninja049
@@ninjahatori2599 already subscribed :)
can u take me with you in bug bounty? I'm learning
@@MuhammadAhmed-tz9mr ok thank
Why use ' +--+ ?
commenting the rest of the query out so that the third ' doesn't break the query.
Can u tell me automation testing via skype, teamviewer or whatsapp or messanger or discord or whatever u prefer
can u tell me any automation testing way?
yes
please subscribe and share my chanel
Already subscribed
So, how can I connect with u?
@@MuhammadAhmed-tz9mr ok thank you
Psti ga di kasih reward kan ?
Reflective xss . good work.
That's a reflected XSS my friend, not stored lol
sorry
I think you can't exploit it, if the server isn't vulnerable of CSRF. (Complicated reflected XSS 🙄)
@@TNTpeoplenetwork no, it is exploitable. @ninja hatori, did you reported it?
@@slaxblake I did not get a prize because of a duplicate
@@TNTpeoplenetwork ok
were you able to score a bounty?
I did not get a prize for duplicate
Cmiiw. But isn’t it just a reflected xss?
ye
Good
thank
any bounty or hof?
I have reported that there was no reply
waw emaizing
thank's