Description: BLOG: http://dummy2dummies.blogspot.com
download and sync the new lab modules from the test bed link given below.
Part 19 of the Sqli-labs series based on error based sqlinjections, blind injection boolian type and time based type. This video covers basics of bypassing blacklist filters.
Link to part 1: http://www.securitytube.net/video/4171
Link to part 2: http://www.securitytube.net/video/4200
Link to part 3: http://www.securitytube.net/video/4208
Link to part 4: http://www.securitytube.net/video/4210
Link to part 5: http://www.securitytube.net/video/4269
Link to part 6: http://www.securitytube.net/video/4283
Link to part 7: http://www.securitytube.net/video/4303
Link to part 8: http://www.securitytube.net/video/4326
Link to part 9: http://www.securitytube.net/video/4399
Link to part 10: http://www.securitytube.net/video/4532
Link to part 11: http://www.securitytube.net/video/4650
Link to part 12: http://www.securitytube.net/video/4667
Link to part 13: http://www.securitytube.net/video/4672
Link to part 14: http://www.securitytube.net/video/4672
Link to part 15: http://www.securitytube.net/video/5104
Link to part 16: http://www.securitytube.net/video/5562
Link to part 17: http://www.securitytube.net/video/6035
Link to part 18: http://www.securitytube.net/video/6176
Link for test bed: https://github.com/Audi-1/sqli-labs
Tags: sqli , SQLi , Sqli-Labs , sqli-labs walkthrough , SQL injections , sqli-labs , learn SQLi , learn sql injections , outfile , dumpfile , load_file , post sqli , sqli in POST , double query injection , update query injection , sqli in insert query , sqli in header , header based sqli , cookie injection , sqli in cookie , second order sqli , second order injection , Audi-1 , waf bypass. ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
@Audi Big Hugs to you... :) Waiting for your upcoming videos :)
Happy diwali to all and one of the best gifts by you to the community on Diwali thanks Audi
A very HAPPY DIWALI to all the viewers on SecurityTube.
@Audi are you from India or some where else...? Can i have your facebook page link :)
@pentest
I am nattively from India, but currently based in Netherlands. I do not use Facebook actively, i know i need to work on that front but get lazy. https://www.facebook.com/pages/Dummy2dummies/301512506611805.
Hey Audi, nice meeting you I appreciate your video series and learned some new things...maybe for future videos you might consider the firefox addon hackbar as it is a little better to see. Then just typing in the browsers command line and you could show and introduce unicode and other bypassing techniques with it. Also how to drop a shell into the webserver would be an interesting watch, or load balancer detection and WAF bypassing. I do not know how that might be possible to integrate into your lab just saying what would be an interesting addition. But besides I really love your work man. Best regards from the Netherlands to the Netherlands and a happy diwali to you too.
Nice video, here is just one note from my side:
It is possible to use the 2nd column for exploitation.
Consider:
select 1,2,3
What we does was:
select 1,2,3&&'1
(because we had to consume the last ' because we can't make comments).
But what we can also do is:
select 1,2,3&1'foo
Because MySQL will use the last stuff as header, e.g. select 1'foo', 2'abc' will print 1 and 2 and with headers foo and abc.
==> So we can do something like:
select 1,2,3&(select 1 from information_schema.schemata where user()='root' limit 1)'fooo
And it will work greatly ;)
(notice that we have to use %a0 for all spaces in the above statement to work in the lab.)
But thank you for your great videos!!