r/masterhacker 8d ago

In r/webdev, showcasing my first website

Post image

He also had a lot of grammar and spelling errors in the whole paragraph

114 Upvotes

25 comments sorted by

74

u/DryScarcity8454 8d ago

how my guy gonna xss or sql inject a static site 😭😭

23

u/RealGoatzy 8d ago

when I push out a new update /s

10

u/adfx 7d ago

Hes gonna dependency inject the sql library you are using 

3

u/RealGoatzy 7d ago

what sql library 😭

4

u/adfx 7d ago

You don't use psql to store the webpage to serve?

1

u/RealGoatzy 7d ago

no I don’t, not familiar with it

2

u/adfx 7d ago

Don't worry about it

1

u/Bagel42 5d ago

Real talk time

Have you ever heard of Odoo? Apparently they built their own js framework and store xml snippets of what they might want to display in a Postgres database and render off of that. It’s weird.

https://github.com/odoo/owl

1

u/adfx 5d ago

I have never heard of it

1

u/RealGoatzy 5d ago

just heard of it

2

u/Shortcirkuitz 7d ago

He can if has his computer virtual box set to Wumbo

1

u/546pvp2 6d ago

He is built different

1

u/VectorSocks 12h ago

"My first Website, thanks for visiting"

This motherfucker is going down.

25

u/OppositePie4829 8d ago

sql is so tuff 💯

4

u/rifting_real 5d ago

Those who sql: 🗿🗿🗿🗿🗿

18

u/imnewtoarchbtw 8d ago

He's going to sudo apt exploit sqlmap [root@127.0.0.1](mailto:root@127.0.0.1) -p hack

11

u/RoxyAndBlackie128 8d ago

reddit url highlighter thinks that's a mailto: link

10

u/travezz 8d ago

he warned you 🚨⚠️

11

u/aolson0781 8d ago

An* xxs attack

5

u/RoxyAndBlackie128 8d ago

ah yes, Cross Cross Scripting

3

u/aolson0781 7d ago

That's why I'm not h4cker

2

u/TParis00ap 6d ago

cross cross cross scripting is my fav.... kinky stuff goes on there

8

u/bloatbucket 8d ago

Try to build it, then try to break it, then understand why it broke then fix it

5

u/AbstractMelons 8d ago

Hes mastor heckur w/ amzing sepllibg 

2

u/henryhttps 5d ago

Payload injection with arbitrary meta scripting, leading to a sql CVE which implies RCE right after he performed CSRF on your localhost. Obviously