Загрузка страницы

SQL Injection - Lab #1 SQL injection vulnerability in WHERE clause allowing retrieval of hidden data

In this video, we cover Lab #1 in the SQL injection track of the Web Security Academy. This lab contains an SQL injection vulnerability in the product category filter. To solve the lab, we perform a SQL injection attack that causes the application to display details of all products in any category, both released and unreleased.

▬ ✨ Support Me ✨ ▬▬▬▬▬▬▬▬▬▬
Buy my course: https://academy.ranakhalil.com/p/web-security-academy-video-series

▬ Contents of this video ▬▬▬▬▬▬▬▬▬▬
00:00 - Introduction
01:22 - Lab #1 SQL injection vulnerability in WHERE clause allowing retrieval of hidden data
02:10 - Understand the exercise and make notes about what is required to solve it
03:32 - Exploit the lab manually
11:57 - Script the exploit
28:47 - Summary
29:07 - Thank You

▬ Links ▬▬▬▬▬▬▬▬▬▬
SQL injection Theory video (previous video): https://www.youtube.com/watch?v=1nJgupaUPEQ
Python script: https://github.com/rkhal101/Web-Security-Academy/blob/main/sql-injection/lab-01/sqli-lab-01.py
Notes.txt document: https://github.com/rkhal101/Web-Security-Academy-Series/blob/main/sql-injection/lab-01/notes.txt
Web Security Academy Youtube Video Series Release Schedule: https://docs.google.com/spreadsheets/d/16ypyLuDq2DZ1JAz_WvL1ZV-WiDWhvomgrK_1Hux4MFY/
Web Security Academy: https://portswigger.net/web-security
Rana's Twitter account: https://twitter.com/rana__khalil

Видео SQL Injection - Lab #1 SQL injection vulnerability in WHERE clause allowing retrieval of hidden data канала Rana Khalil
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
8 марта 2021 г. 0:00:14
00:29:23
Другие видео канала
Business Logic Vulnerabilities - Lab #2 High-level logic vulnerability | Long VersionBusiness Logic Vulnerabilities - Lab #2 High-level logic vulnerability | Long VersionAuthentication Vulnerabilities - Lab #9 Brute-forcing a stay-logged-in cookie | Short VersionAuthentication Vulnerabilities - Lab #9 Brute-forcing a stay-logged-in cookie | Short VersionBusiness Logic Vulnerabilities - Lab #1 Excessive trust in client-side controls | Long VersionBusiness Logic Vulnerabilities - Lab #1 Excessive trust in client-side controls | Long VersionAuthentication Vulnerabilities - Lab #12 Password brute-force via password change | Short VersionAuthentication Vulnerabilities - Lab #12 Password brute-force via password change | Short VersionAuthentication Vulnerabilities - Lab #6 Broken brute-force protection, IP block | Short VersionAuthentication Vulnerabilities - Lab #6 Broken brute-force protection, IP block | Short VersionSQL Injection - Lab #7 SQL injection attack, querying the database type and version on OracleSQL Injection - Lab #7 SQL injection attack, querying the database type and version on OracleBusiness Logic Vulnerabilities - Lab #7 Weak isolation on dual-use endpoint | Long VersionBusiness Logic Vulnerabilities - Lab #7 Weak isolation on dual-use endpoint | Long VersionAuthentication Vulnerabilities - Lab #8 2FA broken logic | Short VersionAuthentication Vulnerabilities - Lab #8 2FA broken logic | Short VersionBusiness Logic Vulnerabilities - Lab #5 Low Level Logic Flaw | Short VideoBusiness Logic Vulnerabilities - Lab #5 Low Level Logic Flaw | Short VideoBusiness Logic Vulnerabilities - Lab #6 Inconsistent handling of exceptional input | Short VideoBusiness Logic Vulnerabilities - Lab #6 Inconsistent handling of exceptional input | Short VideoBusiness Logic Vulnerabilities - Lab #4 Flawed enforcement of business rule | Short VersionBusiness Logic Vulnerabilities - Lab #4 Flawed enforcement of business rule | Short VersionBusiness Logic Vulnerabilities - Lab #7 Weak isolation on dual-use endpoint | Short VersionBusiness Logic Vulnerabilities - Lab #7 Weak isolation on dual-use endpoint | Short VersionCommand Injection - Lab #3 Blind OS command injection with output redirection | Long VersionCommand Injection - Lab #3 Blind OS command injection with output redirection | Long VersionSQL Injection - Lab #15  Blind SQL injection with out-of-band interactionSQL Injection - Lab #15 Blind SQL injection with out-of-band interactionDirectory Traversal - Lab #5 File path traversal, validation of start of path | Long VersionDirectory Traversal - Lab #5 File path traversal, validation of start of path | Long VersionCORS - Lab #4 CORS vulnerability with internal network pivot attack | Long VideoCORS - Lab #4 CORS vulnerability with internal network pivot attack | Long VideoBusiness Logic Vulnerabilities - Lab #3 Inconsistent security controls | Long VersionBusiness Logic Vulnerabilities - Lab #3 Inconsistent security controls | Long VersionBroken Access Control - Lab #12 Multi-step process with no access control on one step | Long VersionBroken Access Control - Lab #12 Multi-step process with no access control on one step | Long VersionBroken Access Control - Lab #2 Unprotected admin functionality with unpredictable URL | Long VersionBroken Access Control - Lab #2 Unprotected admin functionality with unpredictable URL | Long VersionAuthentication Vulnerabilities - Lab #9 Brute-forcing a stay-logged-in cookie | Long VersionAuthentication Vulnerabilities - Lab #9 Brute-forcing a stay-logged-in cookie | Long VersionAuthentication Vulnerabilities - Lab #5 Username enumeration via response timing | Long VersionAuthentication Vulnerabilities - Lab #5 Username enumeration via response timing | Long Version
Яндекс.Метрика