SQL Injection - Lab #11 Blind SQL injection with conditional responses

Поделиться
HTML-код
  • Опубликовано: 16 ноя 2024

Комментарии • 87

  • @RanaKhalil101
    @RanaKhalil101  3 года назад +9

    Interested in supporting me and gaining early access to the Web Security Academy videos when they're recorded? Consider buying my course: academy.ranakhalil.com/p/web-security-academy-video-series! ✨ ✨

  • @pablofalco
    @pablofalco 3 года назад +20

    I've been doing one course after the other, no one explains explains things like you do. Fantastic job! Thank you.

  • @mih4743
    @mih4743 Год назад +3

    I thought I was afraid of spiders, long lines at Disney and Jury Duty.
    I was wrong, I'm afraid of Burp Community Edition.
    Python script is life saver, thank you!

  • @karthikbt7239
    @karthikbt7239 9 месяцев назад

    You're an amazing teacher! Can't believe this content is free. Thank you for your efforts 🙏

  • @bouzrouraramzi4756
    @bouzrouraramzi4756 3 года назад +6

    thanks for all your effort its really rare to find such a good content in the security field keep going

  • @HerbertEduardoFernandezTamayo
    @HerbertEduardoFernandezTamayo 3 года назад +5

    Awesome video, in case anyone has issues dealing with SSL Version Error, I switch off the proxy during the request, like this: r = requests.get(url, cookies=cookies, verify=False), after that I got the password, in my system (intel i3, no gpu) It tooks 13 minutes. Thanks a lot Rana

    • @NassimDhaher
      @NassimDhaher 2 года назад +1

      In my case was getting a dozen error from a bunch of different files other than my file. Ran out of options to debug. Removing the proxies=proxies did it. Thanks for sharing this hint.

    • @smbsid
      @smbsid 2 года назад +1

      Thanks for the tip, I had the same issue before seeing your message.

    • @footballcafe.2635
      @footballcafe.2635 Год назад +1

      Thank you for this, I was getting the same error until I came across your comment and it solved it

    • @karthikbt7239
      @karthikbt7239 9 месяцев назад +1

      Thank you so much for this comment!

  • @camelotenglishtuition6394
    @camelotenglishtuition6394 2 года назад +1

    100% the best online series that I've ever seen. Well-paced, well explained. Just outstanding. Thank you!

  • @psychology2251
    @psychology2251 2 года назад

    WOW, BEST TEACHER EVER KEEPS GOING TEACH US TO KEEP THE WORLD CLEAN AND SECURE! ,

  • @josimartaf
    @josimartaf 2 года назад

    Just passing by to say Thank you, Teacher,
    I m learning a lot with you.
    Greetings from Brazil.

  • @Harini.R
    @Harini.R 3 года назад +3

    Was just searching for this one and here it is! Eager to watch this :)

    • @androidhack450
      @androidhack450 3 года назад +1

      +1

    • @Harini.R
      @Harini.R 3 года назад +2

      My bruteforcer script is running right now and I can't wait! 😂

  • @abdoulsalamamoumoune7296
    @abdoulsalamamoumoune7296 6 месяцев назад

    Ma Sha Allah! thanks again for this useful and instructive work

  • @williambonneau2614
    @williambonneau2614 2 месяца назад

    very quality video thanks a lot. for those who want to optimise the python script, you can compare to ascii the index of password in database with your enumeration, (compare with ">") you will have less iteration, 30second nedded to find the password. if you want more you can use multithreading, with 16 threads it's take approximately 2 second

  • @mandulatula
    @mandulatula Год назад

    Thank You Teacher. Explanation to each statement is brilliant👏

  • @abbassadeghi366
    @abbassadeghi366 2 месяца назад

    like always your introducing was great my best teacher!!!

  • @M3dicin3_mAn
    @M3dicin3_mAn Год назад

    Great content! Just purchased your course. Thank you for all the amazing effort and work. I am a bootcamp student and this is bringing up my skills greatly.

  • @briannjuguna3626
    @briannjuguna3626 2 месяца назад +1

    This is awsooome omg i have no words😃

  • @aceabbott
    @aceabbott 9 месяцев назад

    You very much earned my subscription. Thank you for the explanations.

  • @kusharora1435
    @kusharora1435 2 года назад

    what an effort and so very well explained.. ! thank you so much!!

  • @r3dd0g31
    @r3dd0g31 2 года назад

    Excellent video!
    I really enjoyed the scripting portion.
    I just ended up running multiple cluster bomb attacks and stopping when the requests got throttled. Then I’d shorten the brute force character list by removing the letters that had already been tried. 🤣

  • @olusegunadejorin8084
    @olusegunadejorin8084 3 года назад

    You are wonderful at what you do, kudos for all you do

  • @damianhamilton4681
    @damianhamilton4681 3 года назад

    ahh this is the best one yet! great stuff, keep up the hard work

  • @lakshyasingh6841
    @lakshyasingh6841 3 года назад

    thanks a lot mam this means a lot for me as a student i appreciate ur work a lot.

  • @rakeshraushan9923
    @rakeshraushan9923 3 года назад

    Thanks a lot ma'am, the way as you explain every points is just awesome🤗😊

  • @abhijithk.namboothiry2046
    @abhijithk.namboothiry2046 3 года назад

    Great Content ! Kudos @Rana Khalil

  • @petergentile8974
    @petergentile8974 3 года назад

    THANK YOU for this vid, and thx for scripting it too, ive been trying to figure that out.

  • @JohnSmith-wz7he
    @JohnSmith-wz7he 2 года назад +1

    Great Video. Thank you. I found using proxies with Py Requests quite temperamental and had to do without it? I was getting some cert error, which ended up timing out the request. Has anyone else had trouble with that? How did you get around it?

  • @abdulina-y1m
    @abdulina-y1m Год назад

    l realy like the way you code good for, i hope i well lern more from you keep on

  • @ahmedkhaled6970
    @ahmedkhaled6970 3 года назад

    You are phenomenal, thanks for the scripting part really cleared a lot for since I always rely on my professional burp suite which can result in an IP block a lot of times :)

  • @tonylinux6265
    @tonylinux6265 2 года назад

    You are Best Rana

  • @st1llbleed1ng
    @st1llbleed1ng Год назад

    Love your content. What i am struggling is the script you have written in python, can you explain a little bit more or if you can create a separate video on how to write the scripts. I think bit more knowledge in python for the script is required to write it like the way you did on the fly.

  • @balrampatra8308
    @balrampatra8308 3 года назад

    great explanation. Please make a video on other vulnerabilities also.

  • @abdulx01
    @abdulx01 3 года назад

    Thanks, Our Best Teacher :)

  • @ArifBudiman-rw4vq
    @ArifBudiman-rw4vq 7 месяцев назад

    Thanks for Great Content

  • @mahditabatabai9458
    @mahditabatabai9458 3 года назад

    ty rana best teacher ❤️

  • @thebretya
    @thebretya 3 года назад

    The video is informative, thank you very much.

  • @sawtintkyaw887
    @sawtintkyaw887 3 года назад

    Thank again. I love it a lot.

  • @missclaptrap
    @missclaptrap Год назад

    I'm sorry if this is a silly question, but I've been following along with your videos, and I'm using VS code to take notes and write out the scripts...but I was wondering if you could explain how to use the terminal portion, please? Thank you so much!

  • @mustangpolygraph513
    @mustangpolygraph513 3 года назад +1

    Yay new tutorial!

  • @pranavpatil9107
    @pranavpatil9107 2 года назад +1

    after running script i am getting error in import requests line it is saying that 'no module named "requests" ' what should i do?

  • @akankshagupta4150
    @akankshagupta4150 8 месяцев назад

    from where you have learned writing the script for finding the password ? please can you make a tutotial on this hwo to write a script

  • @randriamahandryrado9800
    @randriamahandryrado9800 Год назад

    Really, thank you so much for all your tuto, i've been stuck with this lab, i knew that i had to automate it but didn't know how. Could you tell us a python course when we could learn the basic of automation for bug bounty without being a complete course on python if we already have a good level in coding (just what is the most common used library).

  • @techsandstories
    @techsandstories Год назад +1

    Dear Rana Khalil,
    I am a Fan of You. But I had a doubt. From the SQLi query we give *** select tracking-id from tracking-table where trackingId = '37129ehsajkdn' *** In the case it is a TRUE statement. Then Why should we give another TRUE statement with this query? (Eg: AND 1=1).
    Statement 1 is already a TRUE statement (Tracking ID = ), then why should we use statement 2 (AND 1=1) ?
    Hope you'll let me know.... Thanks in advance

    • @nishantdalvi9470
      @nishantdalvi9470 9 месяцев назад

      She was show casing that the value of the TrackingId impacts the SQL query on the backend

  • @noah4347
    @noah4347 3 года назад +1

    Mam can you make a complete vedio of website vulnerability assessment how as a pen tester you approach a website and how to find different bugs in different field,

    • @Hacking_vibe
      @Hacking_vibe 3 года назад

      U r really great in explaining things

  • @sajidalam1989
    @sajidalam1989 3 года назад

    AOA Sister!
    Thank you for another great video just want to ask about after a lot of practicing through your web application security videos are we able to participate in hacker one and other platforms for bug bounty programs?

  • @mahmoudreda6415
    @mahmoudreda6415 2 года назад +1

    How can i learn writing python scripts like these ? I know pyhton basics.

  • @ahmedmo3wad574
    @ahmedmo3wad574 2 года назад

    thank you for your awesome playlist, i can do the following with python instead of ascii table,
    alpha = list(string.ascii_letters+ string.punctuation + string.digits)
    for i in alpha:
    ...{}..'{}'.format(number, character)..etc

  • @turalkanal2113
    @turalkanal2113 Год назад

    6:30 I did not understand one thing. when we enter the site the site gives us an tracking id then adds it to db
    then it checks if there are any tracking id same with this in database. why it is not always true? don't you have to add database if you get tracking id.
    this is the problem only for this lab(this predicted code). because there is no login or register. Could you please help me?

  • @odenko7680
    @odenko7680 3 года назад

    great work and really helping a lot , are you going to do all portswiger labs ??

    • @abhijithk.namboothiry2046
      @abhijithk.namboothiry2046 3 года назад +1

      ya, i was about to ask. The Best Solution Content in Portswigger. It not only helps us solve, but also help us learn. Kudos

  • @laquandramissick5937
    @laquandramissick5937 3 года назад

    I'm struggling with this... are we supposed to run Burp while we run the script? because I don't have VS code in my VirtualBox

  • @razaabbas5668
    @razaabbas5668 3 года назад

    Thank you, Rana. You are a lifesaver :D I really want to take my python game to next level. Kindly suggest to me some good resources.

  • @vhsonacomeback
    @vhsonacomeback Год назад

    Did anyone else not have the 'Welcome Back' message display for them? The message displayed initially. But, I needed to restart my computer, and now it doesn't show up at all.

  • @pranavmishra1101
    @pranavmishra1101 2 года назад

    Hi, Was using the python script to run the attack as I didn't have Burp Professional. But when I was importing requests I got an error saying that it could not recognize the module named requests. Using the VS Code Editor. Kindly help. Thanks

  • @intruder70
    @intruder70 9 дней назад

    But how can i get table name in real world in this case, i mean blind SQL?

  • @codermomo1792
    @codermomo1792 12 дней назад

    It is better to use binary search

  • @androidhack450
    @androidhack450 3 года назад +1

    I was just tryin' to solve it, i couldn't!

    • @knightknight3026
      @knightknight3026 3 года назад +1

      mee too i tried all the methods like request requests-html seleium but none of those fetched me result with welcome back i dont know why!

    • @RanaKhalil101
      @RanaKhalil101  3 года назад +2

      Hopefully you'll be able to solve it after watching the video ;)

    • @androidhack450
      @androidhack450 3 года назад

      @@knightknight3026 there is no "Welcome back!" In this lab, I think you watched the video so no need to explain, am sure Rana did a great job!

    • @lhariibikunle1154
      @lhariibikunle1154 2 года назад

      @@knightknight3026 if you want to see welcome back, go to option, look for Grep match, clear anything you see there and add welcome back.

  • @cybersec-radar
    @cybersec-radar 3 года назад

    Thanks alottt....

  • @knightknight3026
    @knightknight3026 3 года назад

    tq so much

  • @Hacking_vibe
    @Hacking_vibe 3 года назад

    Awesome

  • @mahditabatabai9458
    @mahditabatabai9458 3 года назад

    why this scrip is not workin on my windows 10 but i can run it on my ubuntu?

  • @robertallison903
    @robertallison903 3 года назад +1

    So I was running the python script and it seemed to be working (I was getting the 'processing password...' text and seeing the alpha_numeric characters cycle through. However, it would just go on indefinitely. Finally I noticed that I wasn't getting new entries in my burp's http history. Anyone have any idea what was wrong with my script? Only thing I did differently was remove the https value from my 'proxies' variable. For some reason it was giving me an error asking for host name etc (running on Linux if that means anything)

    • @anasr1990
      @anasr1990 2 года назад

      I'm having the same issue now, did you resolve the issue. could you please help me

  • @shashii00
    @shashii00 2 года назад

    i could not solved it , i have community addition burp , it was so slow , and im not good at python it looks scary ( watched your full video rana ) help please to solve this lap (* and im new into cybersecurity)

  • @raycrew
    @raycrew 3 года назад

    When I follow along with this lab I run into an issue when using intruder. I am not receiving a change in the length field, they all remain the same value. Could someone point out why this would be happening? I am using the following: ’ and (select username from username='administrator' and
    LENGTH(password)>1)='administrator'--'

  • @roastedChick3n
    @roastedChick3n Год назад

    you could try cookie' OR 1=0-- this will evaluate to true

  • @cybertoucan526
    @cybertoucan526 2 года назад

    Oh my. This script 😍

    • @tyresewhyte9364
      @tyresewhyte9364 2 года назад

      you can please send me the full script please and thanks

  • @tyresewhyte9364
    @tyresewhyte9364 2 года назад

    you can please send me the full script please and thanks

  • @MuhammadUmar-iq4on
    @MuhammadUmar-iq4on 4 месяца назад

    Please be my mentor......guide me through to my journey in becoming a web pen tester..... please!!!!

  • @TH3_L0NEwolf
    @TH3_L0NEwolf 2 года назад

    it shows me index out of range at url = sys.argv[1] help me

  • @adamm3158
    @adamm3158 2 года назад

    Thanks for you such informative video. I tried it multiple time but having issue "Syntx Error" : Invalid Syntex - If could be assisted in fixing
    sqli_payload = "' and (select ascii(substring(password,%s,1)) from users where username='administrator')='%s'--" % (i,j) sqli_payload_encoded = urllib.parse.quote(sqli_payload)
    cookie ={'TrackingId': 'Cookie_ID' + sqli_payload_encoded, 'session': 'session_ID' }

    • @420monkey
      @420monkey 11 месяцев назад

      cookie(s) TrackingID