InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties…

Follow publication

Member-only story

SQL Injection

How to detect and exploit SQL Injection vulnerabilities.

0xLuk3
InfoSec Write-ups
Published in
4 min readOct 22, 2024

--

Structured Query Language (SQL) Injection, or SQLi, is a web security vulnerability that allows an attacker to interfere with queries an application performs to its database.

This method will allow attackers to view data that is typically not accessible. This data may belong to other users or any other data that the application can access.

An attacker can often delete or modify this data, which may permanently alter the application’s behavior.

How to detect SQL injection vulnerabilities

SQL injection can detected manually by using a systematic set of tests against every entry point in the application.

For example, you can submit a quote” ‘ “ character and look for errors or misbehavior.

You may also use boolean conditions such as “OR 1=1” and “OR 1=2” to check how the application responds.

Suppose you prefer using tools to find most SQL injection vulnerabilities. In that case, you can use Burp Scanner or sqlmap, which are designed to replicate the actions and methodologies of a skilled manual tester.

It is better to do it manually for a better understanding. Tools are handy and automate processes, but they come and go.

SQL injection in different parts of the query

--

--

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Written by 0xLuk3

Security researcher, bug bounty hunter, and cybersecurity student

No responses yet

Write a response