Find and Exploit NoSQL Injection

Поделиться
HTML-код
  • Опубликовано: 7 янв 2025

Комментарии • 28

  • @fedfinancial
    @fedfinancial Год назад +4

    Fantastic instructor, clear and to the point!

  • @roruphotography
    @roruphotography Год назад +4

    I love this video so much! Simple and clear instructions! So easy to follow for someone like me just starting to dabble into the SQL world!

    • @hackvlix
      @hackvlix Год назад +1

      and not artificially inflated to 30 minutes 😉

  • @Mohamad_El_Jammal
    @Mohamad_El_Jammal Год назад +2

    I did use the same method and payload in stocker htb today lol great job

  • @chibikoto
    @chibikoto Год назад +6

    I could listen to an audible by Alex any day.

  • @xinhuang0
    @xinhuang0 Год назад +2

    Now I know how to inject. Thank you Alex!

  • @youcef2851
    @youcef2851 Год назад +1

    thank you sir , i Wonderd if is it possible to make the video longer and cover two or more subjects , we are always ready for more really

  • @denisvoroshilov2682
    @denisvoroshilov2682 4 месяца назад

    Excellent! Incredible!

  • @nickg.7275
    @nickg.7275 Год назад

    Nice videos. I like this "short video" format.

  • @h1dz257
    @h1dz257 Год назад +2

    Increase you mic volume, my speakers are almost at max.

  • @felixhar6782
    @felixhar6782 Год назад

    Hey Heath Adams, I am looking forward to buy your courses because I want to become a very good Ethical Hacker. In your Video "How to become an Ethical Hacker: Edition 2023" you said, that you need to know the basics. What should I need to learn before starting your course? Or can I start your course with 0% of knowledge. I never have worked in any IT filed. How can I learn the basics from you? Kind regards

  • @NiyaDarlin
    @NiyaDarlin Год назад

    Thank you 🎉

  • @karthiklingala5673
    @karthiklingala5673 Год назад

    Please make a video on IDOR vulnerability

  • @bymartin29597
    @bymartin29597 Год назад

    Hello, nice video.
    This only works if the password not encrypted?
    Since if you ask for the user and the query grabs the encrypted password it should try to encrypt it "again" in order to check if it is valid right?

  • @norsalam9302
    @norsalam9302 Год назад

    Thank you

  • @NatureFactzDaily
    @NatureFactzDaily Год назад

    Good video

  • @wer_gumizz1012
    @wer_gumizz1012 Год назад

    How do you protect the application against this attack ?

    • @LuminousWhispers11
      @LuminousWhispers11 Год назад +1

      I haven't seen this type of injection (SQL Injections are more common), but the recurring theme when it comes to injection attacks is input validation.

  • @albertobarbieri8280
    @albertobarbieri8280 Год назад

    I'm practicing nosql injection to solve some HTB CTF but I don't undestand why you converted it into JSON. Can you explain me this?
    On the Internet I see that converting can help abusing Nosql injection. But why? thanks :D

    • @angeleeh
      @angeleeh Год назад +1

      I think its because mongodb uses json and stores everything as key value pairs, just like json

  • @ZenMaster332
    @ZenMaster332 Год назад

    Best!

  • @danishazizkhan6099
    @danishazizkhan6099 Год назад +4

    Teach me i am Hungary

  • @hammadalvi5705
    @hammadalvi5705 Год назад

    Hi. I need Realistic and Practical advice. U seem pro. Love your videos. I'm 32, I modifying OS Win & Android, tweaks etc. E.g after trying for 4 days, I created a tweak to Disappear (PowerOffMenu) from my phone's LockScreen, without rooting it. (Telling you this so you know, I'm not hacker but I know how to use computer lol) I know AutoHotKey n few dos & Linux commands. Basically, I'm ZERO at real hacking. So, What should I do first? (A) Get used to Kali? (B) Learn Python? (C) Java? Where should I start so I can see some results also.

    • @fathersoftweakersfazerfrea7315
      @fathersoftweakersfazerfrea7315 Год назад

      Start with the basics.
      Also depends if you want to do web apps, I would suggest to focus on the following first:
      html,javascript, cookies, json, databases (sql and nosql),networking (basic networking, different types of requests like post/get etc).
      Linux commandline (grep,awk,curl etc)
      Get used to a proxy like burp or zap to intercept requests.
      Python and Bash scripting next.
      Then watch a good methodology, i would recommend Jason Haddix his video's to get a proper workflow 😉
      After that get ready to deepdive in whatever area you are most interrested in and get really good at that, after that you can diversify.

  • @bophadeezgames
    @bophadeezgames Год назад +1

    Hello

  • @AlfonsoMacias-on4tn
    @AlfonsoMacias-on4tn Месяц назад

    please talk louder

  • @Alex-xb8yo
    @Alex-xb8yo Год назад

    first