Anatomy of SQL Injection Payload (Session 40 - Security Testing)

Поделиться
HTML-код
  • Опубликовано: 11 сен 2024
  • View Notes Here - www.evernote.co...
    In this session, I have explained the anatomy of the SQL Injection Payload in detail as part of Security Testing Training.

Комментарии • 11

  • @joey1317
    @joey1317 Год назад +2

    Thank you for making this so clear. I’ve watched many sql injection videos and this is the only one that’s explained in a way that I can understand! Thank you!

    • @QAFox
      @QAFox  Год назад

      Welcome :)

  • @Free.Education786
    @Free.Education786 2 года назад +1

    Excellent. Please make complete video tutorial on SQLMAP to bypass WAF CLOUDFLARE AKAMAI MODSECURITY AWS CDN etc...

  • @RanganathanPbecse
    @RanganathanPbecse 3 года назад +1

    So the loop hole here will be on DB side or client side ?? or at both sides ?? and what need to be implemented to avoid this injection ??

    • @QAFox
      @QAFox  3 года назад

      Server side. May be encoding need to be implemented or the proper validation should be done from the server side by the developer.

  • @sivagopinaidu
    @sivagopinaidu Год назад

    hi can you do web application pentration testing videos basic and begginers level and also explain all type web attacks and asvs test cases please do video's on web application penetration videos

  • @anoopshetty3580
    @anoopshetty3580 7 месяцев назад

    whenever i insert sql payloads I am redirected to a page and get The requested URL was rejected. Please consult with your administrator.

  • @justkiddieng6317
    @justkiddieng6317 8 месяцев назад

    ' a=a-- will not work because a is not string and not put in quote. But thanks for this

    • @justkiddieng6317
      @justkiddieng6317 8 месяцев назад

      And also it will return all the records but will only choose the first record which is always admin user like you said

    • @justkiddieng6317
      @justkiddieng6317 8 месяцев назад

      or does it work in different daatabase?