SQL Injection Explained With

Поділитися
Вставка
  • Опубліковано 15 лис 2024

КОМЕНТАРІ • 22

  • @NahamSec
    @NahamSec  2 місяці тому +2

    🔗Link to the free hands on labs on HackingHub: app.hackinghub.io/hubs/Interactive-sql-injection
    🧑🏽‍💻 Access to my course for 50% off using code 'SQLUA-cam': bugbounty.nahamsec.training/

  • @lsik231l
    @lsik231l 2 місяці тому +1

    Yes, this content is great. It's nice to visualize the reason why the symbols and queries cause SQL issues.

  • @mrsuli1624
    @mrsuli1624 28 днів тому

    Thanks for sharing, love the channel as pentester this is my fav channel

  • @djchaznyc7709
    @djchaznyc7709 2 місяці тому +1

    This was great! I definitely need to revisit this to take the information in better. Definitely like the in depth ground level kind of information in here.

  • @AG-ur1lj
    @AG-ur1lj 2 місяці тому +1

    Hey Ben! I clicked this video because it’s your most recent. Tbh I feel like I’m pretty decent at appsec/offensive web security. However I’m pretty new to actually hunting these bounties. I was hoping to convince you to do a short video on exactly how competitive bug bounties are.
    I’ve found several bugs, but never been the first to report them. I know better than to ask you to give your secrets away. That said, a little advice might go a long way. Should I spend longer searching more deeply for vulns that haven’t been found? Or maybe I should look at bounties with a wider scope? I’m worried I might just be too slow. How fast do I realistically need to be to land a payout? I’m hoping the answer lies in getting better at vetting the bounties I pursue; that seems a far easier goal than simply getting faster overall. Anyway love the channel. Thanks for spending your time to educate us all!

  • @anujchauhan-y4o
    @anujchauhan-y4o 2 місяці тому +2

    Great Now i am jump these site to doing some crazyyyyyyy Love from India Thanks ! :)

  • @rajivkhanal01
    @rajivkhanal01 2 місяці тому +1

    love your content bro
    love from Nepal

  • @Jarling-so4oi
    @Jarling-so4oi Місяць тому

    explain open redirect snd some of the lesser known vulnerabilities which are found on bug bounty

  • @elinamk12
    @elinamk12 2 місяці тому

    it was so use full big thanks.

  • @N1ckdgr8
    @N1ckdgr8 2 місяці тому +1

    @NahamSec Hacking Hub held a CTF making competition where some challenge would be rewarded. I had submitted a challenge but never heard back. I’m just curious what happened?

  • @AbdulquddusAbdulrahman-p2t
    @AbdulquddusAbdulrahman-p2t 2 місяці тому

    Thank your for the eye opener

  • @MISTYEYED.
    @MISTYEYED. 2 місяці тому

    Thank you!

  • @h5e
    @h5e 2 місяці тому

    Love you naham

  • @breakingtwitting
    @breakingtwitting 2 місяці тому

    seems like sharing is caring no longer exists,. barely seen any bug bounty writeups lately. Any information shared publicly now is fed to AI scrappers

  • @Redforeman1970
    @Redforeman1970 2 місяці тому

    Very cool

  • @daytonsprague8425
    @daytonsprague8425 2 місяці тому +1

    His laptop cover is fire

  • @ananthakrishnaner9807
    @ananthakrishnaner9807 2 місяці тому

    🎉🎉🎉

  • @mukuldubey1491
    @mukuldubey1491 2 місяці тому

    ❤❤

  • @prakhar0x01
    @prakhar0x01 2 місяці тому +1

    Before following you it's -> es-Q-el
    Now it's -> cqual

  • @kongpanha1816
    @kongpanha1816 2 місяці тому

    ❤🎉