SQL Injection
Boolean Based Blind SQLi
user()
It returns name of user currently using the db
substring()
It returns a substring of given argument. It takes 3 parameters i.e input string, position of substring and its length.
Example
We can iterate over letters of the username by using payloads such as
Union Based SQLi
Our target is to make the original query payload empty and using our own payload
We used a trick i.e third dash after two dashes and a space
This is because most browsers auto remove trailing spaces in the URL, so u add a character after the space
Steps to find fields
use NULL to find out no of columns
use different data types to find out type of data returned
SQLMap
It automates the whole process
Get Parameter
-p tells us which parameter to check
technique used is Union based attacks
Post Parameter
technique used is boolean
Last updated