SQL Injection - Lab #17 SQL injection with filter bypass via XML encoding | Long Version

Аватар автора
Python высокопроизводительные вычисления
In this video, we cover Lab in the SQL injection module of the Web Security Academy. This lab contains a SQL injection vulnerability in its stock check feature. The results from the query are returned in the application&response, so you can use a UNION attack to retrieve data from other tables. The database contains a users table, which contains the usernames and passwords of registered users. To solve the lab, perform a SQL injection attack to retrieve the admin user&credentials, then log in to their account. ▬ ✨ Support Me ✨ ▬▬▬▬▬▬▬▬▬▬ ▬ ? Contents of this video ? ▬▬▬▬▬▬▬▬▬▬ 00:00 - Introduction 01:24 - Navigation to the exercise 01:52 - Understand the exercise and make notes about what is required to solve it 02:57 - Exploit the lab 08:07 - Summary 08:25 - Thank You ▬ ? Links ? ▬▬▬▬▬▬▬▬▬▬

0/0


0/0

0/0

0/0