SQL Injection Vulnerability Explained | TryHackMe Junior Penetration Tester

แชร์
ฝัง
  • เผยแพร่เมื่อ 8 ก.ย. 2024

ความคิดเห็น • 45

  • @gmoguel69
    @gmoguel69 2 ปีที่แล้ว +4

    The best expaination for SQL Injection that I've ever heard, I never understood until I watched this video, thank you.

  • @iCyberVenom
    @iCyberVenom ปีที่แล้ว +3

    Great explanation. Best to increment by one for each letter/number when "guessing" database/table/username/password instead of randomly hopping between letters and numbers. Then again...a script could automate this entire process, so it's interesting this SQL injection task never mentions it. It leaves learners with the impression they'll have to memorize these manual tests.

  • @peepers46
    @peepers46 2 ปีที่แล้ว +4

    This was one of the best explanations of SQL injection I've seen Thank you

  • @TYLONsRoar
    @TYLONsRoar 4 หลายเดือนก่อน

    Thank you Kind Sir. Now all I have to do is watch👏 cram👏 and repeat.👏

  • @NimbleSF
    @NimbleSF ปีที่แล้ว +1

    Very VERY helpful. I don't totally know all the SQL formatting and arguments and stuff yet, so it helps to have it explained. It was even better once you started explaining beyond the task because it helped reinforce the points the tasks made.

  • @user-ix4fs3km4v
    @user-ix4fs3km4v 8 หลายเดือนก่อน +1

    once again mr. Motasem to help me not lose more time banging my head against the wall, thanks!

  • @aroxander
    @aroxander 11 หลายเดือนก่อน

    very nice video, I was very confused on the wording at level 4 so seeing how you were doing it made it click in my head

  • @alexandrabeekers3747
    @alexandrabeekers3747 2 ปีที่แล้ว

    Totally agree with previous comments. Thank you for this excellent explanation, couldn't have done it without it.

  • @sharky9493
    @sharky9493 2 ปีที่แล้ว +1

    I struggle in task 8.....thanks for the help!!

  • @hequinteros
    @hequinteros 2 ปีที่แล้ว +3

    The best explanation I have seen for SQL Injection, specially about the task #8 😊

  • @tonyYoutube2
    @tonyYoutube2 5 หลายเดือนก่อน

    Merci pour tes explications

  • @TheSpecialist54
    @TheSpecialist54 2 ปีที่แล้ว

    I find your channel very informative thanks bro.

  • @extremoleste8310
    @extremoleste8310 2 ปีที่แล้ว

    Friend I really like your classes, please make more videos of hard level machines

  • @francesa5096
    @francesa5096 2 ปีที่แล้ว

    Thanks a lot for the detailed explanation. This is so beautiful

  • @silentkille4
    @silentkille4 2 ปีที่แล้ว +1

    great explanation love your content

  • @aht_root7133
    @aht_root7133 ปีที่แล้ว +1

    Thanks broo

  • @mongodb7832
    @mongodb7832 2 ปีที่แล้ว

    Great video, will be watching more.

  • @alveek
    @alveek 6 หลายเดือนก่อน

    thanks, man

  • @WarThunderista
    @WarThunderista 4 หลายเดือนก่อน

    Guys I suggest you to bang your head first and see this video after you complete it on your own to confirm your knowledge. This way you are going to understand everything much better.

  • @GuyFawkes1
    @GuyFawkes1 2 หลายเดือนก่อน

    What is the purpose of union, from what I understood it is used to select data from multiple tables, I am banging my head against the wall understanding this part union select 1, union select 1,2,3

  • @Blu3yyy
    @Blu3yyy ปีที่แล้ว

    Thank you!

  • @kezzle9609
    @kezzle9609 2 ปีที่แล้ว +2

    This isn't much of an explanation, like why you changed the id to a zero

  • @arunakumbar-bs6ne
    @arunakumbar-bs6ne ปีที่แล้ว

    Well explained thank you🥳

  • @firecasts
    @firecasts ปีที่แล้ว

    Like jesus christ age 33rd comment to thank you a lot. I was trying in the third part. Monitoring everything I tried to mix something, but the hint were not so nice.

  • @chocolate9111
    @chocolate9111 2 ปีที่แล้ว

    Need Hip Flask walk-through!

  • @sufij
    @sufij 2 ปีที่แล้ว

    Hey brother! Can you please cover the CSS room! Been stuck on the last challenge for a couple days and cannot figure out what exactly im doing wrong. Apparently there is an automated component which appears to be complicating things a bit.

  • @fmoney
    @fmoney 2 ปีที่แล้ว +1

    At 18:53 did you copy the single apostrophe before the OR? It’s not working for me and I need to spend more time to understand it worked but I don’t understand what I was doing wrong. On a better note I figured out the password started with a three as soon as you said numbers I tried 1 2 then 3 and got a true response on the level three question

    • @MotasemHamdan
      @MotasemHamdan  2 ปีที่แล้ว +1

      Yes I did. If it didn't work with single one, try it with double.

    • @fmoney
      @fmoney 2 ปีที่แล้ว

      @@MotasemHamdan I tried with double I was copying with the single apostrophe every time but it only worked once. I’m having fun though.

  • @huuloc8719
    @huuloc8719 2 ปีที่แล้ว

    Thank you so much bro

  • @vimalan_sb
    @vimalan_sb ปีที่แล้ว +1

    At 23:25, Can you please explain how the SQL query -> "SELECT * FROM users where username = 'user' UNION SELECT 1, 2, 3;" changed the value from {"taken" : false} to {"taken" : true} even though the username : 'user' is not present in the database ??

    • @missx0
      @missx0 ปีที่แล้ว

      I have the same doubt.

    • @vimalan_sb
      @vimalan_sb ปีที่แล้ว +2

      @@missx0 The where condition username = 'user' will never be true because there is no such username in the database. Assume that the users table has 5 columns, when we use ' UNION SELECT 1,2,3,4,5 ' a dummy row with 5 columns will be returned. Since a row with 5 columns ( Similar to that of users table) is returned the application logic assumes that the where condition became true and users table row is fetched.

    • @iSgapetti
      @iSgapetti ปีที่แล้ว +1

      @@vimalan_sb I think it's just like in 7:36, where the id must be changed from 1 (a valid one) to a 0 (invalid one). TryHackMe's explanation is: The article is being displayed because it takes the first returned result somewhere in the web site's code and shows that. To get around that, we need the first query to produce no results. This can simply be done by changing the article id from 1 to 0.
      So I'm guessing that if the first part of the UNION statement will somehow be disregarded if it is invalid or produces no results.

  • @institutfuralternativewahr8292
    @institutfuralternativewahr8292 ปีที่แล้ว

    the last room kinda confused me
    thanks

  • @davidb9323
    @davidb9323 2 ปีที่แล้ว +1

    Can you increase your audio volume ?

  • @z3t4r44
    @z3t4r44 4 หลายเดือนก่อน

    I was stuck in lvl 4 after finding 'analytics' as the table name...

  • @mridontclickbaitftw4366
    @mridontclickbaitftw4366 ปีที่แล้ว

    Im kind of confused how you got 3845 on the boolean based injection....

  • @unclehoop3554
    @unclehoop3554 2 ปีที่แล้ว

    so at 35:56, you just keep enumerating all the numbers and letters as long as it returns true? Is that how you get the number 38?

    • @unclehoop3554
      @unclehoop3554 2 ปีที่แล้ว

      I think I get the answer from you at 42:45. Thank you for making this video!

  • @NoName1412
    @NoName1412 2 ปีที่แล้ว

    i want to ask , what if we dont know the length of the password or username?, thank you.

    • @MotasemHamdan
      @MotasemHamdan  2 ปีที่แล้ว +3

      You need to keep trying by incrementing the characters until you are able to guess the complete password. In an automated fashion, sqlmap would do this for you.

  • @itay1207
    @itay1207 ปีที่แล้ว

    your audio is alwas low !

  • @cyberteccyber7691
    @cyberteccyber7691 2 ปีที่แล้ว

    top top de + br

  • @gihandilshara847
    @gihandilshara847 2 ปีที่แล้ว

    2nd view and like