Just thinking about the last part of the video, where you mentioned that "LIMIT" could be used to curtail the attack so that not all data is leaked. Just wondering if the attacker could just comment out the latter part of the query, and then "LIMIT" becomes useless.
in 4 years you have not at all changed visually , love the content quality
Thanks for the Video, I incorporated the solution in one of my project, great job
Just thinking about the last part of the video, where you mentioned that "LIMIT" could be used to curtail the attack so that not all data is leaked.
Just wondering if the attacker could just comment out the latter part of the query, and then "LIMIT" becomes useless.
Thanks for sharing DC.
Thanks for great content!
We appreciate the comments (2x!) and happy you liked it!!
Another great video although it is not clear why XSS has been combined in this category and the video does not discuss it.
isn't it obvious ? XSS operates the same, an attacker injects malicious scripts into web pages.
great job
Love you!
Thanks for great content
Glad you enjoyed it and thanks for the comment!
Great video!
Thanks and appreciate the comment!
please upload another video for Insecure Design 2021
Yep! We got that one coming a little later today!