Комментарии:
great content
ОтветитьThis was nice. Thank you 🙏👏👏👏👏
Ответитьlol...now a days firewalls and sniffers are more powerful and normally thwarts this kind of attacks. However, good explanation.
Ответитьinteresting things
Ответитьthanks a lot
ОтветитьBro, I have some suggestion for you, make a playlist for all web attacks. Like a injections in sql injections, xss and many more. Bro there are no great resources for students to learn web exploitation for ctfs .if you solve that it would be a great help
Ответитьwhat if there is comment filter applied and password is taken after converting to hash?
ОтветитьOkay but what if filtering is involved and filters out the - - or other commands?
ОтветитьNice video. What will be the approach when we don`t know the login? how to build queries then?
Ответитьhow do i look what the sql query is?
Ответитьi liked your deeply explanation, please provide more like this contents! Thanks
Ответитьthis dude looks familiar is he the no.1 rank on hackerone
ОтветитьHello, I tried doing this via sqlmap, however I don't seem to be able to do that. Would you mind telling me what command is needed to be used to perform the sqli with sqlmap?
ОтветитьThank you for this useful video
Ответитьreally good explanation! keep up the good work
ОтветитьGood explanation sir
Ответить