@@muhammadtaha2578 Hi Muhammad, I completely understand. If you’re finding a part challenging, try watching that section of the video again. No need to rush-take a break, then come back and focus on understanding how each command works and what it’s doing. You’ll get it soon enough! Feel free to reach out if you need any more help.
@@MatSec I’m new to this and, while I completely understand what you’ve done, I’m having trouble remembering everything. That means if I try to do it on my own, I might struggle. I’ve just started learning and am focusing on web application penetration testing. Is that the right path for me?
@@muhammadtaha2578 Of course! No one can remember everything at once, it’s totally normal. The key is continuous practice in your free time. The more you work on it, the more it will start to stick, and soon enough you’ll get the hang of it. Keep pushing forward!
Hello,why did you use the payload you used and I couldn’t find that payload on github. Why did you write that payload and where did you find it? And wouldn’t another payload use be useful for us ?
@@TolgaCanÜnal-m3v If you are asking about SQL injection, instead of using OR, I used ||, which serves the same purpose because filters might block OR or AND. So, I opted for the symbol as an alternative.
If you like this video, Please like, Share and Subscribe❤
I often wait for your video :)
@@anujchauhan-y4o ❤️
Sir, I hope you don't mind me asking, but you mentioned this is the easy way.I'm finding this approach quite challenging
@@muhammadtaha2578 Hi Muhammad, I completely understand. If you’re finding a part challenging, try watching that section of the video again. No need to rush-take a break, then come back and focus on understanding how each command works and what it’s doing. You’ll get it soon enough! Feel free to reach out if you need any more help.
@@MatSec I’m new to this and, while I completely understand what you’ve done, I’m having trouble remembering everything. That means if I try to do it on my own, I might struggle. I’ve just started learning and am focusing on web application penetration testing. Is that the right path for me?
@@muhammadtaha2578 Of course! No one can remember everything at once, it’s totally normal. The key is continuous practice in your free time. The more you work on it, the more it will start to stick, and soon enough you’ll get the hang of it. Keep pushing forward!
@@MatSec Where did you learn hacking? Also, I tried accessing your Discord server, but nothing seems to be showing up
@@MatSec Apologies if my comments are bothering you
Super useful video. I was stuck on the web page and trying to find a foothold on other ports. Thanks
I will get rewarded from my videos if you guys learn something from me ❤
Hello,why did you use the payload you used and I couldn’t find that payload on github. Why did you write that payload and where did you find it? And wouldn’t another payload use be useful for us ?
@@TolgaCanÜnal-m3v If you are asking about SQL injection, instead of using OR, I used ||, which serves the same purpose because filters might block OR or AND. So, I opted for the symbol as an alternative.
i didn't understand why ' || 1-1;-- - worked and not the first one
@@ryuma8599 because OR, AND are getting blocked so we use symbol to bypass OR = ||