Комментарии •

  • @HackerShiv
    @HackerShiv Месяц назад +8

    Unfortunately, i also couldn't escalate or extract db other than just a manual SQL error. But its still considered a p1-p2 vuln.
    Join discord, i'm releasing a roadmap for beginners soon and we can learn together. I'm gonna upload as many resources I can.

  • @garrinormanivannacov370
    @garrinormanivannacov370 12 дней назад +1

    Awesome! thankyou brother

  • @kavyagungah2393
    @kavyagungah2393 Месяц назад

    Subscribed, good content

    • @HackerShiv
      @HackerShiv Месяц назад

      Ayy thank you! ❤️

  • @breakoutgaffe4027
    @breakoutgaffe4027 25 дней назад

    Cool video bro! Subbed. What was the SQLi classified as, P3?

    • @HackerShiv
      @HackerShiv 25 дней назад +1

      It was a SQL error so it's classified p3-p4 but dif programs can classify as p1 since it's technically sqli.

  • @fightlikedead9734
    @fightlikedead9734 Месяц назад

    Good video

    • @HackerShiv
      @HackerShiv Месяц назад

      Thank you 🫂❤️

  • @breakoutgaffe4027
    @breakoutgaffe4027 25 дней назад

    I like piping the subfinder output to httpx to check the response codes, neat

    • @HackerShiv
      @HackerShiv 25 дней назад

      Haha. Thank you very much ❤️ (still learning 🫡)

  • @Tatsuia0
    @Tatsuia0 4 дня назад

    Which is the platform where u take this bug bounty program?

    • @HackerShiv
      @HackerShiv 4 дня назад

      @@Tatsuia0 Open program.

    • @Tatsuia0
      @Tatsuia0 4 дня назад

      @@HackerShiv bugcrowd, hackerone or other?

  • @IbrahimAli-wd
    @IbrahimAli-wd 27 дней назад

    please explain every steps. thanks in advance

    • @HackerShiv
      @HackerShiv 27 дней назад

      Sure, will do next time 🙂

  • @_subhanazam
    @_subhanazam 4 дня назад

    17:10 here the problem was you didn't encode the payload !

    • @HackerShiv
      @HackerShiv 4 дня назад +1

      Oh yh shit. I just realised. Its actually ctrl + u as shortcut on burp to encode the highlighted payload. I thought it was for xss only but im stupid lol 😂. Thanks for catching that. 🙏
      Unfortunately, i also couldn't escalate or extract db other than just a manual SQL error.

  • @aatankbadboy3941
    @aatankbadboy3941 Месяц назад

    Bro why not you explain your steps😢

    • @HackerShiv
      @HackerShiv Месяц назад +2

      Next time, I can explain through text on screen so that it helps, but slow down the video to understand what i'm doing. ❤🙂

    • @jobaizen4892
      @jobaizen4892 Месяц назад

      @@HackerShiv ok bro waiting, +sub. But can u explain in detail?

    • @shiiswii4136
      @shiiswii4136 Месяц назад

      @@jobaizen4892 just watch closely

  • @zeeqcybersec3311
    @zeeqcybersec3311 11 дней назад +1

    you made too many mistake. first you need to learn sqlmap. how sqlmap works. second using burp, doesn't work if you change the method POST to GET but you made mistake in url. you must convert the text to url first in burp afer that send the request. it's not wrong using other people's tools but make sure you know how to use it.

    • @HackerShiv
      @HackerShiv 11 дней назад +1

      Yeah, i'll try to better next time. I noticed i missed a few important data POST parem using ghauri. But the SQL error, it was a manual finding through url pollution bro. I didn't use any tools for that.

    • @zeeqcybersec3311
      @zeeqcybersec3311 11 дней назад

      @@HackerShiv goodluck on learning more about pentesting btw your vid is great but unfortunately have mistakes. if you dig more deeper maybe you can earn more than $500 because the sqli vuln so high on that website. goodluck on your journey

    • @HackerShiv
      @HackerShiv 11 дней назад

      @@zeeqcybersec3311 Thank you!