SQLi

Detection

Insert special chars:

SQLi union

Need to determine number of columns

The payloads described use the double-dash comment sequence -- to comment out the remainder of the original query following the injection point.

On MySQL, the double-dash sequence must be followed by a space. Alternatively, the hash character # can be used to identify a comment.

Test for string column

Multiple column in one

Blind SQLi

Start with simple condition and compare results

If it works try with more complex conditions

Error blind sqli

If simple condition not change behavior, try to do error of db

Visible error sqli

Especially string literal when other type expected, try CAST

Time Delays

Injection inside xml body

Try to do simple data manipulation

If waf try to bypass with Hackvector encode with hex_entities/dec_entities

Last updated