• Home
  • Introduction
    • What Is SQL Injection
    • SQL Injection Risks
  • Attacks
    • Basics
    • Test
      • SQL Injection Detection
      • Identify Data Entries
      • Determining Query Structure
      • Anomalies
    • Techniques
    • Extract Information
    • Blind
  • Advanced
    • Stored Procedures Attacks
    • SQL Injection Tools
    • Uncategorized Notes
  • Defense
    • Code Level Defense
  • Resources
    • Simulation Environment
  • About
    • About Us
    • Contact Us
Logo SQL Injection
  • GET THE BOOK!

  • Recent Articles

    • Time-Based Blind SQL Injection using Heavy Query
    • Estimating MySQL Table Size using SQL Injection
    • Time-Based Blind SQL Injection Attacks
    • Analysing Server Response and Page Source
    • Database Fingerprinting for SQL Injection

Archive of Gathering Information

  • Find Table Names for SQL Injection

    Find Table Names for SQL Injection

    Posted in Gathering Information

    Extracting table names to achieve SQL injection. Before building a query to extract sensitive information, the attacker must know what data he wants to extract and where it is stored in the database. This article explains how to show table names. To simplify learning, we suppose that...

    Continue reading this entry →
  • Find Column Names for SQL Injection

    Find Column Names for SQL Injection

    Posted in Gathering Information

    Extracting column names for a given table. Once the attacker knows table names he needs to find out what the column names are in order to extract information. This article explains how this information can be found using meta data...

    Continue reading this entry →
  • SQL Injection Using UNION

    SQL Injection Using UNION

    Posted in SQL Injection Techniques

    Understanding how to create a valid UNION-based attack to extract information. UNION-based attacks allow the tester to easily extract information from the database. Because the UNION operator can only be used if both queries have the exact same structure, the attacker must craft a SELECT statement...

    Continue reading this entry →
  • SQL Injection Login Bypass

    SQL Injection Login Bypass

    Posted in SQL Injection Techniques

    Understanding SQL injection attacks against login form. Login bypass is without a doubt one of the most popular SQL injection techniques. This article presents different ways an attacker can use to defeat a login form. Principles detailed here are simple but strongly related to Continue reading this entry →

  • Determining Query Structure

    Determining Query Structure

    Posted in SQL Injection Test

    Understanding how to craft a malicious SQL segment. One of the main tasks of a penetration tester is to figure out what is the original query structure. This precious piece of information will allow him to take control over the main query with a specially crafted SQL segment...

    Continue reading this entry →
  • SQL Injection Detection

    SQL Injection Detection

    Posted in SQL Injection Test

    Detect potential SQL injection vulnerabilities. The first step towards achieving a successful SQL injection attack is to detect vulnerabilities. Of course, some tools can automate the process, but it’s better to understand how detection can be done manually. In addition, there are some situations where...

    Continue reading this entry →
  • Identify Data Entries for SQL Injection Attacks

    Identify Data Entries for SQL Injection Attacks

    Posted in SQL Injection Test

    Where SQL injection vulnerabilities could be found. First and foremost, the tester will need to identify data entries before attempting an attack. Despite the fact that SQL injection is among today's most popular security issues, all fields are not necessary vulnerable. For this reason, you must be...

    Continue reading this entry →
  • SQL Injection and String Parameters

    SQL Injection and String Parameters

    Posted in SQL Injection Basics

    How to perform SQL injection in text fields. The only difference between numeric parameters and string parameters is that the latter is enclosed between quotes. From an attacker perspective it simply means that the injected SQL segment must be crafted in...

    Continue reading this entry →
  • SQL Injection Attacks and Numeric Parameters

    SQL Injection Attacks and Numeric Parameters

    Posted in SQL Injection Basics

    Understanding numeric SQL injection. Attacks against numeric parameters are the simplest way to achieve a SQL injection. This kind of vulnerability is also widely spread since developers often consider that numeric parameters are safe when in most cases they are not. Let's now see...

    Continue reading this entry →
  • Stacked Queries

    Stacked Queries

    Posted in SQL Injection Techniques

    Execute multiple statements in the same query to extend the possibilities of SQL injections. Stacked queries provide a lot of control to the attacker. By terminating the original query and adding a new one, it will be possible to modify data and call stored procedures. This technique is massively used in SQL injection attacks...

    Continue reading this entry →
12
  • About

    Sqlinjection.net was developed to provide information about SQL injection to students, IT professionals and computer security enthusiasts. It intends to be a reference about this security flaw.

    Read more
  • Main Sections

    • Introduction to SQL Injection
    • SQL injection Tutorial
    • Advanced SQL Injection
    • Securing Against SQL Injection
    • Resources for SQL Injection
  • Disclamer

    This website and/or it's owner is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to sqlinjection.net.
  • Sqlinjection.net Logo
Copyright 2020 SQLINJECTION.NET - All rights reserved. Copyright  ·  Disclaimer  ·  Terms of Use  ·  Privacy Policy  ·  Back to Top ↑