Manual Exploitation of Common SQL Injections (Playground and CheatSheet Included)

Поділитися
Вставка
  • Опубліковано 21 лис 2024

КОМЕНТАРІ • 7

  • @billy392
    @billy392 8 місяців тому

    I came from reddit. Keep up the good work mate!

  • @eugeneosadchiy7241
    @eugeneosadchiy7241 4 місяці тому

    Great video, Maks. Keep it up! 👍

  • @shaiksohil7058
    @shaiksohil7058 8 місяців тому

    thanks, great video

  • @Fallin625
    @Fallin625 8 місяців тому

    nice

  • @aryaniyengar7384
    @aryaniyengar7384 5 місяців тому +1

    Hey can you make a vid about how to avoid SQL injections and make more secure website and web apps pls i'm a beginner in web development 🙏

    • @maksyche
      @maksyche  5 місяців тому

      Hi! I'm not thinking about such a video for now, but maybe later. SQL injection prevention implementation depends on the language and the library you use, but generally, you should avoid any concatenation or parametrization of SQL queries using string utils. You should always rely on prepared statements. Also, static code analyzers (like SonarQube) highlight you almost all possible SQL injections, so it's helpful to use them in your IDE (or even better in build pipelines of your project).

    • @aryaniyengar7384
      @aryaniyengar7384 5 місяців тому

      @@maksyche thankyou for your guidance 🙏😄