SQL Injection without these special chars [' "()\/%*&\`] possible?
Yep, me and @or4nge16hehe did it.
Using only: [ a-z, 0-9, dot, @+- ]
Write-up soon
#BugBounty#infosec
I’ve identified a confirmed SQLi on a target, but I’m currently stuck due to F5 WAF blocking data extraction. Tested with Ghauri, and injection works, but dumping the DB isn’t possible so far.
@nav1n0x@lostsec_ Any guidance or suggestions on handling this kind of WAF situation
@TahmidNil@MichaelCarthy@nav1n0x use --confirm it will be bypassed easily.. i tried it last time also if not worked use proxychains with residential ips
@TahmidNil@nav1n0x@lostsec_ Bro do manual exploitation just extract the following: (enough for report)
- Database Name
- Database User
- Database Version
👌
Your conversations with ChatGPT are now public.😑
For a few days now, ChatGPT conversations are indexed by Google.
If you share a chat with a friend, anyone can view it.
dork in Google:
"site:chatgpt.com/share" + your topic
#cybersecurite#Aisec