Just thinking about the last part of the video, where you mentioned that "LIMIT" could be used to curtail the attack so that not all data is leaked. Just wondering if the attacker could just comment out the latter part of the query, and then "LIMIT" becomes useless.
in 4 years you have not at all changed visually , love the content quality
Just thinking about the last part of the video, where you mentioned that "LIMIT" could be used to curtail the attack so that not all data is leaked.
Just wondering if the attacker could just comment out the latter part of the query, and then "LIMIT" becomes useless.
Thanks for the Video, I incorporated the solution in one of my project, great job
Thanks for sharing DC.
Another great video although it is not clear why XSS has been combined in this category and the video does not discuss it.
isn't it obvious ? XSS operates the same, an attacker injects malicious scripts into web pages.
Thanks for great content!
We appreciate the comments (2x!) and happy you liked it!!
great job
Thanks for great content
Glad you enjoyed it and thanks for the comment!
Love you!
Great video!
Thanks and appreciate the comment!
please upload another video for Insecure Design 2021
Yep! We got that one coming a little later today!