SQL injection with Filter Bypass via XML Encoding

Поделиться
HTML-код
  • Опубликовано: 11 сен 2024

Комментарии • 20

  • @jahmaijones3353
    @jahmaijones3353 Год назад +4

    Best explanation about how to do this on RUclips, thank you

  • @KL-og8gg
    @KL-og8gg Год назад +4

    love the debug one...good job

  • @g30rgyth3d4rk
    @g30rgyth3d4rk Год назад +4

    Incredible video 😊, definitely learned a lot.

  • @real.xplo1t
    @real.xplo1t Год назад +8

    I think proxying the traffic through burpsuite and using match and replace rules would fix the ampersand encoding issue

  • @G3msFinder
    @G3msFinder 7 месяцев назад

    Best explanation , thank you guys for these awesome series 😊

    • @intigriti
      @intigriti  7 месяцев назад

      Thank you! Glad you like them 💜

  • @JoaquinRamirez
    @JoaquinRamirez Год назад +4

    Great bout troubleshooting, overall great information thanks

    • @intigriti
      @intigriti  Год назад

      Thanks for watching! 💜

  • @AyushKumar-hv2ww
    @AyushKumar-hv2ww Год назад +3

    Nice lecture and explanation ❤️

  • @user-kn6xz8lc6d
    @user-kn6xz8lc6d Год назад

    Thanks! Really nice to see you trying to debug that shit..
    I got to this video because Bing AI recommended it to me when I asked him how to do this lab without using the hackvertor extension. I like manual stuff rather than ready-to-use stuff.
    And finally I could do it all from my browser without even using Burp.. I hesitated to fire up my kali, I was lazy and got stuborn to do right from my browser! lol

    • @intigriti
      @intigriti  Год назад

      Awesome! Glad you enjoyed 😊

  • @juanmassad2015
    @juanmassad2015 Год назад +2

    Very nice video! The python scripts sends the payload to productID, but the vulnerability was in storeID, i think this would solve the issue with sqlmap not finding the vulnerability.

    • @intigriti
      @intigriti  Год назад +2

      Hey, thanks! SQLMap will actually try each possible parameter *but* you can manually specify the correct one by adding an asterisk beside it (storeID in this case). It will save some time but unfortunately the issue with the encoding of tamper payload was still an issue. Somebody did identify the issue: twitter.com/_0x999/status/1615054152291258385. I made the change and re-tested and SQLMap worked perfectly 🔥

  • @eduardprivat9821
    @eduardprivat9821 2 месяца назад

    mate...your rapid mouse movements are anoying =/. make them plz clear, because i look each time to dont miss something id you try to explain. rotate slowly over that region would also works and dont took too much attention from us. thx for your great videos :)

    • @intigriti
      @intigriti  2 месяца назад

      Yeh sorry about that, I tend to rapidly move my mouse when I'm thinking 😣

  • @wtfanupam
    @wtfanupam Год назад +4

    Nice explanation