NoSQL Injection | Pico CTF | CTF For Beginners 2024

Поділитися
Вставка
  • Опубліковано 28 гру 2024

КОМЕНТАРІ • 8

  • @abhinavbansal-cc8gr
    @abhinavbansal-cc8gr Місяць тому +1

    gr8 video bro,but try to be consistent ,post more videos

    • @RahulSinghInfosec
      @RahulSinghInfosec  Місяць тому

      Thank you for the feedback. I’ll try to search for lesser talked about topics

  • @BaoTran-vg8ud
    @BaoTran-vg8ud Місяць тому

    thanks

  • @geealex7990
    @geealex7990 Місяць тому

    Im trying to learn this but it is a struggle. im curious on how one would find the email without having access to source code.

    • @RahulSinghInfosec
      @RahulSinghInfosec  Місяць тому

      So, I think i might have explained in the video. You can try the $ne operator. You can put anything like $ne:”doesnotexisr@x.com”. Since, it’s ne operator, it would result in you being logged in

    • @hfoxhaxfox1841
      @hfoxhaxfox1841 Місяць тому

      You use the $ne operator. Since you knew the email here, you use $eq

    • @geealex7990
      @geealex7990 Місяць тому

      @hfoxhaxfox1841 That doesn't answer my question but thank you for trying to help. I'm sure I found a way to go about it now when I attempt to try the challenge again.

    • @RahulSinghInfosec
      @RahulSinghInfosec  Місяць тому

      Look up ‘portswigger nosql’ injection. There are a lot of labs. That might help you with more hands on nosql injection