SQL Injection - Lab #13 Blind SQL injection with time delays

แชร์
ฝัง
  • เผยแพร่เมื่อ 10 ม.ค. 2025

ความคิดเห็น • 28

  • @RanaKhalil101
    @RanaKhalil101  3 ปีที่แล้ว

    Interested in supporting me and gaining early access to the Web Security Academy videos when they're recorded? Consider buying my course: academy.ranakhalil.com/p/web-security-academy-video-series! ✨ ✨

  • @hermajaystey
    @hermajaystey ปีที่แล้ว

    I am binging this whole series thank you for being an amazing explainer. As soon as I can afford it I am going to pay for your video series to show support to you. THANK YOU

  • @TriNguyen-dl9uu
    @TriNguyen-dl9uu 3 ปีที่แล้ว

    wonderful explanation, I had my aha moments in this video. Keep up the good work

  • @WILLIAMANDREYCHACONBALLESTERO
    @WILLIAMANDREYCHACONBALLESTERO 10 หลายเดือนก่อน

    thank you so much, this was so helpful! greeting from Costa Rica.

  • @alexandro6033
    @alexandro6033 3 ปีที่แล้ว +1

    thank you♥♥
    but in 6:46 the payload for mysql
    the comment is //%20 or #
    Thanks again

  • @hafsaakhter3261
    @hafsaakhter3261 10 หลายเดือนก่อน +1

    Hi I have a question.. In some videos you use '||' this operator and in some you use 'and'.. Can u explain that

  • @truongsonnguyen144
    @truongsonnguyen144 3 หลายเดือนก่อน

    i have 2 questions
    1. with concat string, when you consider with mysql, why did u using || instead of space? (in cheatsheet they're using space)
    2. in a query: seclect tracking-id.... why did it end with ' ?
    can u explain, thank you so much!

  • @mustaquemsheikh572
    @mustaquemsheikh572 3 ปีที่แล้ว +1

    Very nicely explained sister

  • @hibohi
    @hibohi 3 ปีที่แล้ว +1

    Thank you Rana for the amazing guide. Could you please clarify why we need to add the concatenate || in the query? I'm still unclear about this.

    • @ahmedsaleem9327
      @ahmedsaleem9327 3 ปีที่แล้ว +2

      i have the same question why should not it work with AND ?

    • @neadlead2621
      @neadlead2621 ปีที่แล้ว

      @@ahmedsaleem9327 an and need a condition after it because the query is something like SELECT X FROM Y WHERE Z='xxxxxx' so if we add AND we need a condition having sleep after it will not have any sencce and it will result a syntax error

    • @Amit-fn7bw
      @Amit-fn7bw ปีที่แล้ว

      @@ahmedsaleem9327 SAME DOUBTS , if you get the answer please mentained it here.

  • @落珰
    @落珰 2 ปีที่แล้ว

    Thank you, I will follow you in every video

    • @落珰
      @落珰 ปีที่แล้ว

      我也是

  • @acronproject
    @acronproject ปีที่แล้ว

    Thank you Ms.Khalil

  • @lowprivuser2460
    @lowprivuser2460 3 ปีที่แล้ว

    In this tutorial why did on providing single quote on tracking cookie did not throw internal error? , if so how will we know that the parameter is vulnerable to sql injection

    • @camelotenglishtuition6394
      @camelotenglishtuition6394 2 ปีที่แล้ว

      I know it's a late reply but perhaps as you're giving 2 instructions. 1 for the timing delay and the other for length of time? This seems to be logical to me as || is used to join strings / commands.

    • @samamirparviz6279
      @samamirparviz6279 2 ปีที่แล้ว

      @@camelotenglishtuition6394 its not true , its because the application catches database errors and handles them gracefully.

  • @duylt5_letrongduy743
    @duylt5_letrongduy743 2 ปีที่แล้ว +2

    Why don't you try using AND or anything else but use || first?

    • @shba9300
      @shba9300 ปีที่แล้ว

      does it work with AND? because I tried but no results

    • @neadlead2621
      @neadlead2621 ปีที่แล้ว

      @@shba9300 an and need a condition after it because the query is something like SELECT X FROM Y WHERE Z='xxxxxx' so if we add AND we need a condition having sleep after it will not have any sencce and it will result a syntax error and in this case we can't see the result of a syntax error

    • @ererekam
      @ererekam ปีที่แล้ว +1

      AND needs boolean, so it doesn't work. But batched queries will also work:
      '%3B select pg_sleep(10)--

    • @betulbuyukalim
      @betulbuyukalim ปีที่แล้ว

      AND also works: ' AND 1=(SELECT 1 FROM pg_sleep(10))--

  • @danielklibanov5797
    @danielklibanov5797 ปีที่แล้ว

    Dont know if this video is alive and someone replying but I think it was best that if you explaining the xploit part by part, it best to also explain why did you use || to concatenate, I have no idea what made you want to put that, and its ashame cause SQLi is all about logic

    • @amiremami8661
      @amiremami8661 ปีที่แล้ว

      This was exactly my question. Why we used || ? The original code is SELECT pg_sleep(10) , how transformed to || (SELECT pg_sleep(10)) ?

    • @z3nsh3ll
      @z3nsh3ll 9 หลายเดือนก่อน +1

      @@amiremami8661@danielklibanov5797 It seems like the decision to use || was incorrect for a mysql back end since mysql uses CONCAT() for concatenation. || was used since it is the concatenation operator for postrgresql DB which is what is running on the back end for this lab. (If a function is concatenated it is executed as part of the concatenation, hence causing the DB to sleep). However, if all sleep payloads were to be tried as implied in the vid, it would be incorrect to use || as the concatenation operator for all of them. Fwiw, mysql can be configured to use || as a concatenation operator, but there is no way the attacker should assume that it's configured that way.

    • @amiremami8661
      @amiremami8661 9 หลายเดือนก่อน

      @@z3nsh3ll Hey, thank you so much man ❤ , I'm already following you, one of the best channels that explain things deeply 🙏