SQLi
Detection
Insert special chars:
SQLi union
Need to determine number of columns
The payloads described use the double-dash comment sequence -- to comment out the remainder of the original query following the injection point.
On MySQL, the double-dash sequence must be followed by a space. Alternatively, the hash character # can be used to identify a comment.
Test for string column
Multiple column in one
Blind SQLi
Start with simple condition and compare results
If it works try with more complex conditions
Error blind sqli
If simple condition not change behavior, try to do error of db
Visible error sqli
Especially string literal when other type expected, try CAST
Time Delays
Injection inside xml body
Try to do simple data manipulation
If waf try to bypass with Hackvector encode with hex_entities/dec_entities
Last updated