・
Reviews 15
・
Average rating 4.3
I am a current security consultant. Recently, I was able to successfully perform SQLi in an environment where WAF and IPS developed by For*****et and Se*****i are running. In Critical's lecture, SQLi Part 2, bypass techniques are introduced, and I was able to bypass them by getting a big hint from there. In addition, the techniques that are possible when general payloads cannot be used were also very helpful. The company that developed the WAF is a company that everyone in the security industry has heard of, and they must have put a lot of thought and effort into solving the two major issues of service availability and security, but they were eventually able to bypass them. Of course, it is impossible to do it by just watching the lecture once. Absolutely not. That is because the depth of the lecture is incredible, the content is vast, and basic knowledge is also required. It was possible because I visited Critical's lectures very often. As Critical said, repetitive learning is important and a lot of effort is needed to make it mine. I watched Part 1 so many times. This lecture is so in-depth that even people with much more experience than me say it needs no introduction. I am always waiting for the lecture! Please try a little harder for the next lecture! Thank you~




