Back to Browse

List Database Content For Further Exploitation!

36.4K views
Feb 24, 2022
6:44

πŸ‘©β€πŸŽ“πŸ‘¨β€πŸŽ“ Learn about SQL Injection vulnerabilities. In this video, we are going to have a look at how to examine a database for table and columns that can be further used in a UNION payload. Overview: 00:00 Intro 00:17 Lab overview 00:53 Find Number of Columns 01:41 Find Table Names 02:29 Find Column Names 03:38 Exploit The App 05:19 Conclusion For more information, check out https://blog.intigriti.com/hackademy/sql-injection πŸ”— Portswigger SQL Injection Challenge: https://portswigger.net/web-security/sql-injection/examining-the-database/lab-listing-database-contents-non-oracle --- πŸ§‘β€πŸ’» Sign up and start hacking right now - https://go.intigriti.com/register πŸ‘Ύ Join our Discord - https://go.intigriti.com/discord πŸŽ™οΈ This show is hosted by https://twitter.com/PascalSec ( @Hacksplained ) & https://twitter.com/intigriti πŸ‘• Do you want some Intigriti Swag? Check out https://swag.intigriti.com/

Download

0 formats

No download links available.

List Database Content For Further Exploitation! | NatokHD