SQL Injection For Beginners

Поділитися
Вставка
  • Опубліковано 25 лис 2024

КОМЕНТАРІ • 750

  • @LoiLiangYang
    @LoiLiangYang  3 роки тому +1873

    I have started work at Amazon Web Services. Will you be keen to see a day in the life of an AWS cybersecurity professional? :)

  • @viallymboma9874
    @viallymboma9874 Рік тому +160

    I love this channel:
    Straight to the point
    No jokes
    No advert
    Nothing extra outside of just learning content
    Great great great 👍🏽👍🏽

    • @iankip3429
      @iankip3429 9 місяців тому

      Would you help show the installation of the bricks web app. I have installed it and tried to run it but I receive an error saying there is an error in line 9 in the config.php file.

  • @cryproot9845
    @cryproot9845 2 роки тому +1

    I have started in this beautiful world of content on UA-cam, I am new to this and here we go with issues of cybersecurity and ethical hacking

  • @g3n3sisofficiel4
    @g3n3sisofficiel4 3 роки тому +1

    a lot of guy on youtube share video and some step are skipped and when im trying at ame time i need to start again ,your video , not 1 time i move video backwards good explication . nice job

  • @letshack010
    @letshack010 3 роки тому

    You are the only person who discusses hacking material on UA-cam but UA-cam doesn't block you, I like your style, you are my guide

  • @kostiapereguda
    @kostiapereguda 3 роки тому +47

    this was useful like in the 20th century, but now everybody uses libraries to abstract over sql and those utitlize the protection mechanisms against this kind of injection. And even if you don't use libraries, then you can just use escape charaters (eg: &qt) for quoting and all will be fine

    • @altayyerassyl3213
      @altayyerassyl3213 Рік тому +6

      there is an answer for your complain under your comment, lmao. " Thank you so much Loi! Your info is extremely valuable for beginners who are trying to make their websites slightly more secure. " It is not about hacking the system, but for teaching beginners to understand what technologies are used to hack, so we beginners can prevent them.

    • @skltfz4997
      @skltfz4997 Рік тому +2

      the thing to bring out is some sites developed by devs that didn’t aware it. and you were the customer of that site who inputted the cred info 😂

    • @kostiapereguda
      @kostiapereguda Рік тому +9

      @@altayyerassyl3213 I understand your response now that you commented it 18 hours ago. I agree with you that this information is extremely valuable for beginners, and I actually did the full PortSwigger Labs course on SQL injection myself. However, my comment was written more than a year ago, and back then the video was called “How to scan and PWN any website”. It was NOT called “SQL injection for beginners”. Therefore, I excepted this video to be much more advanced and cover advanced topics applicable to modern times. You can see a lot of comments very similar to mine in that regard. I guess that’s why the author eventually renamed the video from click-bait crap to something useful.

    • @strang7739
      @strang7739 Рік тому +1

      @@kostiaperegudaplop just used sql injection to hit moveit and the US defense lmao, now it doesn’t look dumb does it 😊

    • @kostiapereguda
      @kostiapereguda Рік тому +1

      @@strang7739 in general such vulnerabilities are discover by tools, not by people, moreover, specific vulnerabilities like injection vulnerabilities are discovered mostly using white-box analysis, which operates on the source code. It is very rare that black box analysis alone can discover such specific vulnerabilities. Therefore, most of the vulnerabilities are published by the software manufacturers themselves, together with updates fixing those vulnerabilities. However, the hacker gangs try to perform what is known as a zero-day exploit. They target users of the software, who has not updated immediately, and thus hack them using publicly known vulnerability. This is exactly what clop has done. Clop used publicly available exploit to hack into organizations who have not updated the software. 90% of security breaches are actually exploiting already known vulnerabilities and publicly available exploits of the older versions of the software and are happening because users are not updating their software to the newest version. P.s. that’s why you must never disable automatic Windows updates on your PC:)

  • @robertfisher3507
    @robertfisher3507 3 роки тому +127

    A simple way to protect input fields is to convert them before they are part of a sql query. It could be as simple as base64(input string). This way the original query can not be injected. You could also modify base64 algo by shuffling the defined character string of the base64 algo.

    • @damegaye3051
      @damegaye3051 2 роки тому +5

      Thats why we gotta hash passwords??

    • @timmytainment
      @timmytainment 2 роки тому +17

      @@damegaye3051 No. You hash them because if the database is getting hacked, the hackers only got hashed pw instead of plaintext pws. You can crack them with the help of rainbowtables but it needs to be in there to do so.

    • @timmytainment
      @timmytainment 2 роки тому +4

      Maybe I get you wrong but I think what you say isn't working.
      Instead of base64 them (which means they would decrypted and executed aswell) you should use something like "mysql_real_escape_string" and for security reasons and cleancode aswell you shul typehint them. So, if you are working with GET and POSTS from whereever (even in Cookies, which can be manipulated easily) you should do something like $myGetter = (int) $_GET['myGetter'];

    • @HackSociety
      @HackSociety Рік тому +1

      @@timmytainment i cracked a hash some time ago, and the password was 1233abcd.. lol

    • @chrispaul4090
      @chrispaul4090 Рік тому +1

      Use prepared statement, hash and salt the password.

  • @landokiprooo6272
    @landokiprooo6272 3 роки тому +5

    I like how the video is entitled "Learn from a pro hacker now" this got me to watch this fr

  • @scarytruths01
    @scarytruths01 Рік тому

    This is useful information so important about 95% of vulnerability disclosure programs are all looking for this vulnerability

  • @nikolaymihaylov8991
    @nikolaymihaylov8991 4 місяці тому

    Thank you Mr.Yang. You helped me to graduate from university. THANK YOU! :)

  • @riotgrrl2666
    @riotgrrl2666 3 роки тому +32

    Thank you so much for uploading this, i'm VERY interested in cybersecurity but as far as i know, none of the universities near me have it as a career option and i find your videos to be really informative and entertaining!

  • @JohnRobertPotter
    @JohnRobertPotter 3 роки тому +84

    I actually think I love you. Every video you make basically saves me 1-2 months of life, I seriously can't thank you enough!!! Just yes

    • @rcsxuth8594
      @rcsxuth8594 3 роки тому +14

      Sus

    • @JohnRobertPotter
      @JohnRobertPotter 3 роки тому +2

      @@rcsxuth8594 idc

    • @rcsxuth8594
      @rcsxuth8594 3 роки тому

      @@JohnRobertPotter u were like : omg..>! i think im in love with you!

    • @JohnRobertPotter
      @JohnRobertPotter 3 роки тому +5

      @@rcsxuth8594 yep

    • @rcsxuth8594
      @rcsxuth8594 3 роки тому

      @@JohnRobertPotter nope sus still if u say idc then u sussy baka and if u try to cheat the system u gay af fr

  • @haydeneisenstein1092
    @haydeneisenstein1092 3 роки тому +75

    i have no clue what to do with this but ill keep it in mind

    • @Guide4Ever
      @Guide4Ever 3 роки тому +11

      @@callimero2731 There is no need for teamwork lol. SQL injections are plain and simple, either via the list of SQL queries or centralized injection systems that sprout these attacks. This is not movies lol, when hackers work with each other and say: "I'm in!", hahaa. It is usually one perpetrator. Nowadays, due to many services offering DDOS protection, it is more likely to get hit by MTM (man in the middle attacks) that abuses the communication between two users by altering the message or stealing ID_key from either valid communicators and then communicate with 1 of them instead. Though true, DDOS attacks are **sometimes** performed in groups due to sheer overload needed to crash a desired service. Usually, perpetrators turn to bot networks or service injections that use foreign/unauthorized access to vast amounts of computers. Then, they use them to send the payload to the certain service's address. However, due to the filtering systems used nowadays by packet management systems in our devices...it is hardly possible to do anything decent without proxies.

    • @callimero2731
      @callimero2731 3 роки тому +1

      @@Guide4Ever Thank you, it was just my opinion

    • @williambabin7350
      @williambabin7350 3 роки тому +4

      @@callimero2731 who tf is using sqli for ddos?

    • @lanmeglic2401
      @lanmeglic2401 2 роки тому

      u can extract data from website that us vulnerable to this exploit.

  • @nawid1687
    @nawid1687 3 роки тому +53

    Thx for making my requested video!! Apreciate it!

  • @sorrefly
    @sorrefly 3 роки тому +9

    This is actually awesome to show sql injection tools but that was not an SQL injection principle tutorial
    Thank you for the video btw, very helpful for me! :)

  • @tallst1
    @tallst1 3 роки тому +27

    I love this video. Got me excited about Pentesting again

  • @harryrotcher5405
    @harryrotcher5405 3 роки тому +10

    I like how you explain all in simple terms...

  • @Dev_Everything
    @Dev_Everything Рік тому +6

    Thank you for making this. I am getting into backend webdev and this helped me audit my own code. Thanks!

  • @dodzb7362
    @dodzb7362 3 роки тому +20

    this is fixed years ago. using escape characters or isolating the input. Basically, just proper programming practices will do the trick.

    • @hercules.mazucato
      @hercules.mazucato 3 роки тому +1

      Devs are gods in earth

    • @AngelVlad100
      @AngelVlad100 3 роки тому +3

      Yeah, now all modern languages have build-in escaping or ORMs. This vulnerability dead from ~2007.

    • @dodzb7362
      @dodzb7362 3 роки тому

      @@AngelVlad100 super agree

    • @PastEventsTV
      @PastEventsTV 2 роки тому +1

      @@AngelVlad100 haha lol ...sql injection is still no 3

    • @AngelVlad100
      @AngelVlad100 2 роки тому

      @@PastEventsTV I know, but I didn't see any actual public website with such vulnerability for the last 10 years.

  • @Kiddie91
    @Kiddie91 2 роки тому +1

    Sir, as you are an insane expert in this field we want to know what are the steps you followed to get up to this stage what are the things you followed and etc, please make video on this.

  • @IbrahimGanaMalgwi
    @IbrahimGanaMalgwi 3 роки тому +2

    I want to thank you for inspiring me to take up Cyber Security. I just paid for your training on Udemy.

    • @Hephasto
      @Hephasto 3 роки тому

      Don’t fool anyone, you’re going to become a hacker!

    • @hamzajon8823
      @hamzajon8823 3 роки тому

      @@Hephasto no harm on that , how are we gonn improve our security if there is no one to hack it 😜😜

    • @Hephasto
      @Hephasto 3 роки тому

      @@hamzajon8823 if there was no hackers there would be no need to secure anything, does it make sense?

    • @ptrck070
      @ptrck070 3 роки тому

      @@Hephasto and so millions of jobs would be gone

  • @pok7835
    @pok7835 2 роки тому

    mostly of the ORMS in the market today treat this issue. But in my college times i have enjoyed this :)

  • @themotherandthesons
    @themotherandthesons Рік тому

    This is crazy I'm glad I saw this red team security demonstration

  • @andyrew45
    @andyrew45 3 роки тому +1

    Subscribed - learnt more in 5 mins than 5 years

  • @beaustrom923
    @beaustrom923 3 роки тому +1

    4:24 in as of commenting this. Thats super creative, just getting it to put syntax into its message. Legit classic movie style.

    • @francesgisondi7216
      @francesgisondi7216 3 роки тому

      Wat do u mean. Hope u dont mean that, Thats a virus!!!

    • @beaustrom923
      @beaustrom923 3 роки тому +1

      @@francesgisondi7216 Hope I don't mean what?

  • @BambiOnIce19
    @BambiOnIce19 Рік тому

    Compared to the mischief i used to get up to 20 years ago, can i just say this is absolutely WILD stuff. So, so very tempting....😬

  • @yohbabyg6655
    @yohbabyg6655 3 роки тому +8

    You are great teacher. I am new to cyber security.
    Have been seeing videos on UA-cam and so far you are the best. How can I join your members only channel?
    I’m quite excited about learning.

    • @ponely9678
      @ponely9678 3 роки тому +2

      Next to the subscribe button, there is a join button. You have to pay for it

  • @bellaboi4773
    @bellaboi4773 3 роки тому

    Using the information will takes you to the the right way for more information

  • @Alain9-1
    @Alain9-1 3 роки тому

    can't believe why this channel has only 261k subscribers

  • @JohnWalz97
    @JohnWalz97 3 роки тому +3

    Only works for old fashioned PHP-based applications for the most part. There's still quite of few of those out there don't get me wrong. But it is going to be very hard to find any website worth hacking that's still vulnerable to SQL injection.

  • @309-28游竣宏
    @309-28游竣宏 2 роки тому +1

    Thank you so much Loi! Your info is extremely valuable for beginners who are trying to make their websites slightly more secure.

  • @andrew8293
    @andrew8293 Рік тому

    This is why I prefer PDO over mysqli. PDO is so much harder to inject with.

  • @Born2DoubleUp
    @Born2DoubleUp 3 роки тому +1

    I literally watch your videos to help secure a web based game I'm making. I have no experience and know people will find ways to cheat the game or take it offline. Ive been using your tricks to clean my code.

    • @slicker1260
      @slicker1260 2 роки тому

      what programming languages did u use to make the game ? and are u self taught ? or went to school to learn? if so what online free resources did u use to learn all that. Thanks :)

    • @ahmedbahaj8786
      @ahmedbahaj8786 2 роки тому +1

      @@slicker1260 Nobody have the same route towards being a good developer, I tell u what try youtube, coursera, udemy, udacity and just see what suits you, also learn and APPLY don't just learn.

    • @chromeheartsonme
      @chromeheartsonme Рік тому

      ​@@ahmedbahaj8786 the learn and apply part is some of the best advice you couldve offered, i took a programming class back in the day, and after i was done with the class i didnt really do anything with the knowledge i gained, so i forgot a decent amount of what i was taught. had to go to another programming course to make sure i was job ready haha.

  • @necronomicon-xmortis9362
    @necronomicon-xmortis9362 2 роки тому

    impressive truely a master programer Salute...😎

  • @tojogamer1733
    @tojogamer1733 3 роки тому +48

    Informative video, thank you, but naming it "How to scan and Pwn any website" may be a little misleading. Some people will think that "any" website using a database suffers from sqli, which is not the case

    • @DirePantsDim
      @DirePantsDim 3 роки тому +5

      It should be titled "**some old websites".

    • @stevema2
      @stevema2 3 роки тому +1

      exactly what I was thinking. 95-98% of websites I have seen do not display SQL back to the user on the bottom or in the browser console. there have been some exceptions, this is why it's not 100% but to cover just that case only in a video is a weak idea. so the examples are not realistic. for learning it's ok but for a realistic example, it's not even close to how the real world works 🤷‍♂️

    • @tojogamer1733
      @tojogamer1733 3 роки тому +3

      @@stevema2 You can still encounter some real world applications that suffer from sqli. If the devs are lazy and do not use input validation or/and prepared statements, you may end with an sqli. You don't have to get an obvious sql syntax error to exploit it, some times ou may get a 500 internal error that may be indicative of an sqli. Still, devs are more aware of these issues these days, they use also frameworks that embeds already sqli protection routines. that's why saying "Any website" is misleading good sir Loi Liang Yang

    • @stevema2
      @stevema2 3 роки тому +2

      @@tojogamer1733 totally with you. you and I are saying the same thing different ways, just that I haven't seen many web apps where I see a SQL statement being written back to the browser console or in an HTML div. That was my point. There are exceptions but it's not as common which is not "Any website" 😉

    • @rofco5201
      @rofco5201 3 роки тому +1

      @@DirePantsDim there are some new websites who still suffer from sqli

  • @thongnieducationalinstitut8646

    You have got 1 new subscriber from me

  • @lucianjohr5569
    @lucianjohr5569 Рік тому +1

    Thanks so much Loi. This is awesome content.

  • @HusseinAyeni
    @HusseinAyeni 2 місяці тому

    congrats bro,you got 1m

  • @abdulnafay72
    @abdulnafay72 3 роки тому

    Well entire video goes over my head.

  • @vz7742
    @vz7742 3 роки тому +4

    Very easy to follow and understand,thank you very much.

  • @curtisdesler2100
    @curtisdesler2100 3 роки тому

    You're a pro Boss Loi Liang Yang

  • @super7ace
    @super7ace Рік тому

    it worked, it worked. thank you so much.

  • @cesarnoriega8507
    @cesarnoriega8507 7 місяців тому

    Good eve Loi:
    I better start studying your videos thanks I learned something tonight it sounds interesting about SQL injection.
    I just heard it but not quite sure.
    Anyway thank you
    Cesar N.

  • @MuhammadAhmad-hq5zx
    @MuhammadAhmad-hq5zx 3 роки тому +2

    Thank so much
    I have searched alot for an excellent channel like this
    And I want to ask you if you could expand a lot and deep hacking on the future videos
    I don't want to use this for evil
    All what I need is to practice and have a good job
    Keep going
    I wish you a happy life 💓💓

  • @stuffedcode
    @stuffedcode 3 роки тому +4

    Great insight and explanation on SQLI! This is great!

  • @21-muhammadfierlyanirwandi36
    @21-muhammadfierlyanirwandi36 3 роки тому +16

    always love your content loi

  • @tysanders4666
    @tysanders4666 Рік тому

    This was very helpful thANKH you.

  • @Timur_channel97
    @Timur_channel97 3 роки тому +2

    amazing sir.
    from Indonesia

  • @tanmoydas2544
    @tanmoydas2544 3 роки тому +2

    Thank you sir, we need more classes!!

  • @abrarmomin9121
    @abrarmomin9121 3 роки тому +3

    ypu are my best mentor love your videos
    you deserve subscribe

  • @tashijawed5472
    @tashijawed5472 3 роки тому +4

    Hey man, can you make a playlist for all the videos that a noob can watch to learn, like literally someone who just decided to start and completely new to all these jargons, like literally teaching a newbie.

    • @alessandrodimilla8450
      @alessandrodimilla8450 3 роки тому +1

      Study CSS, C+ and java

    • @futureboyy4422
      @futureboyy4422 3 роки тому +3

      as a beginner everyone will tell you do this do that ! ... but man you have to figure it out by yourself whether you google or watch you tube videos

  • @ajimak9170
    @ajimak9170 2 роки тому

    It's is easy to understand,very good

  • @parwezanwer
    @parwezanwer 2 роки тому

    Thank you very. A very very important and informational video learned good things.

  • @Soda-stream
    @Soda-stream 3 роки тому +1

    Nice bro, i have so much learnee from you!!!!

  • @GigaSoftComPl
    @GigaSoftComPl Рік тому

    look a function mysqli_ mysqli_real_escape_string etc this is secure functions

  • @NamLe-fl4sz
    @NamLe-fl4sz 10 місяців тому

    From VietNam. Thankss

  • @tsionwilliamson1385
    @tsionwilliamson1385 3 роки тому +1

    Thats why when you run sql injection you need multiple zombies or to run a script that randomizes ip or both so the servers firewall wont trip at the sheer amount of data coming from one computer

  • @Hkfcbkl
    @Hkfcbkl Рік тому

    Thank you , as a student of sql I see how could this language be used

  • @jimjmcd
    @jimjmcd 3 роки тому

    Wow-- a thirty-minute presentation in 13 minutes!

  • @AlexPeres11
    @AlexPeres11 Рік тому

    wow, you're genius! great, thanks

  • @LL-kz7ge
    @LL-kz7ge 3 роки тому +116

    I mean, just escape your damn SQL. Take advantage of libraries such as PHP's pdo, nobody has got pwn'd like this since the early 2000's.

    • @andyjackson3663
      @andyjackson3663 3 роки тому +14

      Exactly - this is like telling people to take advantage of an XP loophole when everyone isn't using XP. ANYONE making a website that doesn't use prepared statements, and input escaping basically shouldn't be doing it. Most people with little to no web skills will probably use an off the shelf CMS like Wordpress and that has all these entry points covered. They'd either do it themselves using that or go to an external design agency who will do it for them. There are so many off the shelf packages and "systems" (squarespace etc) now that having a modern website is so simple my 12 year old can do it. All those websites come out of the box with inbuilt protection against this sort of stuff so this video will only help you against a website that hasn't been updated in years, and is most likely not even relevant any more anyway.
      Appreciate the content but you should be focusing on the nature of these exploits and what people should be doing to defeat them.

    • @andyjackson3663
      @andyjackson3663 3 роки тому +8

      In addition - a lot of "quality" web hosting providers include auto blocking of attempts to run sql injection so repeated attempts will fail (often the first time). I know of one that increases the ban time by a factor of 2 each time it detects such an attack starting at 2 mins for the first attempt. 15 attempts in and you have to wait over 540 hours before the webserver will even speak to your machine to announce it's accepting your connection, let alone run any kind of input for you...

    • @tyler.3015
      @tyler.3015 3 роки тому

      @@andyjackson3663 do you know some of the more effective attacks being used today like xss or something else ?

    • @InfoSecIntel
      @InfoSecIntel 3 роки тому +3

      It's still plenty common in websites up today, even ones that are brand new.

    • @tonyme7426
      @tonyme7426 3 роки тому +22

      Still part of the ethical hacker courses, so still relevant. Be thankful people take their time to produce such content instead of trying to be a clever shyte.

  • @waifufx
    @waifufx 3 роки тому +1

    Wow so glad I joined your channel

  • @macbook6507
    @macbook6507 3 роки тому +1

    Thanks our beloved lecturer ♥️

  • @fursansharafi8782
    @fursansharafi8782 Рік тому

    it's actually surprising I understood alot of this since i have only beginner to moderate sql knowledge... but damn is it worth it putting all this effort just to get to someone's privacy? *weird*

  • @bazlar8210
    @bazlar8210 3 роки тому +6

    Great video, could you do a tutorial on John the ripper please?

    • @viktor200085
      @viktor200085 3 роки тому

      Online manual is a good place to start

  • @phillipruiz5089
    @phillipruiz5089 2 роки тому

    Love the way you explain things ..keep up the info

  • @factunknown0
    @factunknown0 3 роки тому

    You are really awesome lecturer.
    Tysm for tutorial. Love you sir..😊💐💐

  • @fm0x1
    @fm0x1 Рік тому

    Amazing video tutorial! Thanks you so much. I'm currently studying Web Application Penetration Testing. It was very useful for me!
    Get your Like!

  • @n92
    @n92 Рік тому

    Awesome. Thanks so much Liang Yang :)

  • @sidewinder4702
    @sidewinder4702 3 роки тому +2

    Informative and scary at the same time.

    • @sidewinder4702
      @sidewinder4702 3 роки тому

      @Jonathan Dahan The part of your statement "without needing to know what's going on behind the scenes" is the part I am concerned with. I will also add if everything is so secure why the need for PEN testing in the first place? I get the fact that majority of the vulnerability's are cause by the end user. You would think people who head up IT security would be more aware of the simple stuff.

    • @sidewinder4702
      @sidewinder4702 3 роки тому

      @Jonathan Dahan It would be safe to say then that pen-testers will always be needed to some extend in the industry for the foreseeable future? As with everything computer related I just state don't download anything from an unknown source. Keep software up to date and use anti virus. And the biggest one I constantly say back up your data!

  • @Free.Education786
    @Free.Education786 2 роки тому +1

    Main problem is to bypass WAF (See below list) with SQLMAP. Second SQLMAP can't bypass XOR base encoding and complex time based query restrictions. Some Pakistani hackers has developed their own version of SQLMAP so called GHURI. Similarly ATLAS tool works best with SQLMAP to suggest best suitable WAF bypass tamper scripts.
    Hope to see advance tutorial on these topics soon.
    WAF List SQLMAP can't bypass easily 🙁
    #1) AppTrana
    #2) Prophaze WAF
    #3) Cloudflare WAF
    #4) Sucuri Website Firewall
    #5) AWS WAF
    #6) Akamai
    #7) Imperva
    #8) Citrix WAF
    #9) F5 Advanced
    #10) Barracuda
    #11) Fortinet FortiWeb
    #12) SiteLock
    Thanks ✅️ 😊 🫂

  • @제작자납신다
    @제작자납신다 3 роки тому +5

    Cool, profesional, straight to the point. perfect.

  • @Deezeone
    @Deezeone 3 роки тому +1

    Thank you !! You made me curiuos

  • @harkeBalBahadur
    @harkeBalBahadur 3 роки тому +19

    Using parameterized statement would help in sql injection prevention. Also, limiting the permission of the type of DB user would help too. Why should a normal user be granted permission to show all the tables? 🤓

    • @jean-pierrethievenaz6935
      @jean-pierrethievenaz6935 Рік тому

      Hi, I need good databases about Spain for a project.
      I also want to join a good group of harckers to buy tools. THANKS

  • @phungsalimbu6212
    @phungsalimbu6212 3 роки тому

    Thankyou so much Loi

  • @SilentSolution
    @SilentSolution 3 роки тому

    Thanks for your information and cooperation sir

  • @secilianakwaya6205
    @secilianakwaya6205 2 роки тому

    Will keep it in mind

  • @tjinspace7001
    @tjinspace7001 3 роки тому

    Most stuff has a WAF that blocks sqlmap etc.. Even with the WAF param... Even small hosts

  • @darthfather1294
    @darthfather1294 2 роки тому

    love that intro music

  • @sanskar6323
    @sanskar6323 3 роки тому +25

    Love you bro ❤️❤️❤️

    • @Vuttu121
      @Vuttu121 3 роки тому +1

      Ye chaca idhar bhi☹️☹️☹️☹️

  • @devwelthaus2642
    @devwelthaus2642 3 роки тому

    even beginners use now prepared statements not to mention salted binary passwords

  • @MacTep-Mupa
    @MacTep-Mupa 3 роки тому

    how to Pwn Any Website from 199x, but "in the theory" explanation is good

  • @TOMA-ny7gg
    @TOMA-ny7gg 2 роки тому

    Great video
    Please can u explan from where to start to be hacker?

    • @Oldladywithastick
      @Oldladywithastick 2 роки тому

      I think he already made a video. But you could start with hackthebox or tryhackme if you want to look if its the right thing for you

  • @gamingg-p8r
    @gamingg-p8r 3 роки тому

    good work bro..following suit.

  • @radar2044
    @radar2044 3 роки тому

    2:32 thanks

  • @pick_pick_pick
    @pick_pick_pick 8 місяців тому

    Amazing episode

  • @ZaKat_Thuan
    @ZaKat_Thuan 3 роки тому +3

    That’s perfect !! Thanks ❤️❤️❤️❤️

  • @Manzanillafongus
    @Manzanillafongus Рік тому

    I am not a beginner. I had sql topics at the bachelor. I use technologies such as hadoop

  • @carlbrown06
    @carlbrown06 3 роки тому

    Subbed but prepared statements should nullify these types of attacks.

  • @livrose906
    @livrose906 3 роки тому

    Respect from brazil.
    VIVA CRISTO REI.

  • @jemxvlog3050
    @jemxvlog3050 3 роки тому

    thank you for a great tutorial

  • @emmanuelochubili
    @emmanuelochubili 2 роки тому +2

    Hello @Loi Liang, thanks for this tutorial.. but i would like to say, how effective is SQLi on react,and node js apps ?

  • @svetlanamazhaykina6918
    @svetlanamazhaykina6918 2 роки тому

    Thank you Loi and keep up the good work!

  • @carlosarmenci5783
    @carlosarmenci5783 2 роки тому

    Wow loi you are so clever

  • @gouravkhator
    @gouravkhator 3 роки тому +2

    Can you explain in depth how that payload actually fits in the sql query, by commenting other parts of the query? I am a beginner here, can understand some parts not full..

  • @Wann787
    @Wann787 3 роки тому

    My From Indonesia Thanks😁

  • @ever5lip374
    @ever5lip374 3 роки тому +1

    about your channel: I was looking for copper and I thought it was gold

  • @hesronsamuel4988
    @hesronsamuel4988 3 роки тому

    Thanks man🔥🙌

  • @ZubairAkram-w2f
    @ZubairAkram-w2f 3 місяці тому

    please make video on session hijacking

  • @kimobonbon7
    @kimobonbon7 Рік тому +1

    sqlmap misses out on many opportunities like it doesn't work on altoromutual which is prone to basic sql injections