Pentest pro tip - Integrating SQLmap and Burp suite

Поделиться
HTML-код
  • Опубликовано: 28 авг 2024

Комментарии • 22

  • @mrayoub5564
    @mrayoub5564 3 года назад +2

    Good job

  • @Free.Education786
    @Free.Education786 3 года назад +4

    Please share more complex real life examples like Finding Vulnerable Columns, SQLMAP WAF BYPASS techniques, UPLOAD SHELL and MD5 HASH decryption n other types of error handling. Remember in real life examples SQLMAP got failed because 99.99% people don't know advanced options. Thanks for your help and support brother 🤝❤💙💚💐👍

  • @marekkubacka315
    @marekkubacka315 4 года назад +1

    Nice work, good video

    • @hackitectsplayground
      @hackitectsplayground  4 года назад

      Thank you a lot! :) I hope that I will have more time to get more content.

  • @hackitectsplayground
    @hackitectsplayground  3 года назад

    Based on your feedback I created bonus video about spots for invoking SqlMap in BurpSuite.
    Watch it here:
    ruclips.net/video/L2zqSHInsNQ/видео.html

  • @HarryshKumar-rt2uv
    @HarryshKumar-rt2uv Год назад +1

    Do you(Anyone who knows can reply) prefer using SQLMap and what are its disadvantages...

    • @hackitectsplayground
      @hackitectsplayground  Год назад

      I personally prefer vanilla SQL map. It's lightweight and easy to use. Integration with burp is nice but you need to refresh the logs to get the data and its not realtime.

  • @nigelwoof9143
    @nigelwoof9143 3 года назад +1

    Burpsuite didn't show any active scans after I run the scan..
    even though python apps are shown in the Task manager..

    • @hackitectsplayground
      @hackitectsplayground  3 года назад

      It will not appear in active scans but in the plugin logs, sadly they are not refreshed automaticaly and you need to do it manually. Kind of anti-pattern, but it should work.

  • @Free.Education786
    @Free.Education786 3 года назад +2

    Please share how to use ACUNETIX results to exploit found vulnerabilities like SQLI XSS XSRF LFI RFI etc...bypassing WAF IDS IPS, Hash Recognition, Hash Cracking, Finding Hidden Admin Panels, bypassing admin panel or C-panels, Uploading Shell, Remote code execution-RCE, Rooting Web Server, Gain Root preveliage, Mass Defacement, Maintaining Back door, etc...

  • @eyeinthesky1050
    @eyeinthesky1050 3 года назад +1

    everyone on RUclips made a video about easy and vulnerable sites, there is not one single video about a normal site that can show how to att ck with sql and burp, everybody shows how to open and attack dvwa and all other viulnerable sites, if a site is vulnerable then it´s easy to attack but most people want to know how to attack a website that is a bit more difficult to attack! Be the first channel and make a video about a site that is much more difficult please!

  • @LoneWolf-ro4hn
    @LoneWolf-ro4hn Год назад

    Unable to start api somebody knows something about this

  • @vincent70able
    @vincent70able 11 месяцев назад

    funziona per i siti https anche? Cioè per scoprire hash password admin ? Grazie ciao facci sapere

  • @vincent70able
    @vincent70able 11 месяцев назад

    does it also work for the websites https? That is to discover hash password admin? Thanks hi make us know

    • @hackitectsplayground
      @hackitectsplayground  11 месяцев назад

      Yes it works for websites where you can intercept the traffic. ;) Obviously you need to have permission of the owner in official pentest project. So yes it works also for HTTPS.

  • @eyeinthesky1050
    @eyeinthesky1050 3 года назад +1

    bro you can´t just make everything ready and expect a newbie to do all those things by you telling them to do, where did you sent it to sql scan???? how did you do that? you have to show how to do it not just telling us

    • @eyeinthesky1050
      @eyeinthesky1050 3 года назад +1

      those who did not understood how he did it, right click inside the intruder and choose extentions and then sqlipy scan will send it to sql scan

    • @hackitectsplayground
      @hackitectsplayground  3 года назад +1

      Actually you are correct. I will review the video. I thought that send to sqlipy was there for sure. When I edit the videos I can cut out also important parts because of my author blidness. Thanks for valuable input 🙏.

    • @eyeinthesky1050
      @eyeinthesky1050 3 года назад

      @@hackitectsplayground you putting so much time and energy and making a video, make it right, and please can you make a video of how to find the right/vulnerable url in sqlipy and what to do with it please? Thanks