appsec.fyi

A somewhat curated list of links to various topics in application security.

SQL Injection

LinkExcerptWord Count
Full MSSQL Injection PWNage|=--------------------------------------------------------------------=| |=----------------=[ Full MSSQL Injection PWNage ]=-----------------=| |=-----------------------=[ 28 January 2009 ]=------------------------=| |=---------------------=[ By CWH Underground ]=---------------------=| |=------8810
About the Invicti SQL injection cheat sheetCurrently, this SQL injection cheat sheet contains information for MySQL, Microsoft SQL Server, and some limited information for ORACLE, PostgreSQL, and SQLite.4751
SQL Attack (Constraint-based)It is good to know that nowadays, developers have started paying attention to security while building websites. Almost everyone is aware of SQL Injection.712
BSQLinjector – Blind SQL Injection Tool Download in RubyBSQLinjector is an easy to use Blind SQL Injection tool in Ruby, that uses blind methods to retrieve data from SQL databases. The download is below. The author recommends using the “--test” switch to clearly see how configured payload looks like before sending it to an application.141
Barebones Application SecurityWe’re roughly halfway through this series on basic security steps for Startups to take. After introducing the series, we covered Cross Site Scripting (XSS) and then Cross Site Request Forgery (CSRF).871
https://stealingthe.network/efficient-time-based-blind-sql-injection-using-mysql-bit-functions-and-operators/0
Welcome to the NetSPI SQL Injection Wiki!This wiki's mission is to be a one stop resource for fully identifying, exploiting, and escalating SQL injection vulnerabilities across various Database Management Systems (DBMS).120
SQL Injection 101: Common Defense Methods Hackers Should Be Aware OfDatabase technology has vastly improved the way we handle vast amounts of data, and almost every modern application utilizes it in one way or another. But the widespread use of databases naturally invites a slew of vulnerabilities and attacks to occur.1108
Comprehensive Guide to Sqlmap (Target Options)Hello everyone. This article will focus on a category of sqlmap commands called the “target commands.” Many might not have tried these commands but they can be proved very useful in corporate world.144
Making a Blind SQL Injection a Little Less BlindSomeone told me the other day that “no-one does SQL Injection by hand any more”. I want to tell you about a SQL Injection bug that I found and exploited manually. Disclaimer: for the most part, I’m going to take you down the ‘happy path’ here.2119
https://link.medium.com/0Scc0MzsTU0
SQL injection cheat sheetThis SQL injection cheat sheet contains examples of useful syntax that you can use to perform a variety of tasks that often arise when performing SQL injection attacks. You can concatenate together multiple strings to make a single string.611
https://medium.com/bugbountywriteup/sql-injection-to-lfi-to-rce-536bed29a8620
Understanding the full potential of sqlmap during bug bounty huntingSwiss army knife for SQL Injection attacks, sqlmap was first developed in 2006 by Daniele Bellucci and later maintained by Bernardo Damele and Miroslav Stampar.1731
https://link.medium.com/q4mazES8o20
https://medium.com/bugbountywriteup/sql-injection-time-and-boolean-based-27239b6a55e8?source=twitterShare-1764222123d3-1576594710&_referrer=twitter&_branch_match_id=7325579850023024010
https://hackersonlineclub.com/sql-injection-cheatsheet/0
vavkamil/awesome-bugbounty-toolsA curated list of various bug bounty tools ReconSubdomain Enumeration Port Scanning Screenshots Technologies Content Discovery Links Parameters Fuzzing ExploitationCommand Injection CORS Misconfiguration CRLF Injection CSRF Injection Directory Traversal File Inclusion GraphQL Injection Header Inject4230
https://link.medium.com/d30FnknTbdb0
https://link.medium.com/t0dgez8Tbdb0
https://secnhack.in/website-penetration-testing-and-database-hacking-with-sqlmap/0
https://link.medium.com/voxUHjIDidb0
https://link.medium.com/Y8r2RcJDidb0
DVWA 1.9+: Blind SQL Injection with SQLMapWelcome back. In the previous article we’ve covered manual SQL Injection with the help of OWASP ZAP. In this article we’ll hack DVWA’s Blind SQL Injection with the help of SQLMap, one of the most powerful tools of our toolbelt.787
https://0xgad.medium.com/sql-injection-in-graphql-2859c96547a80
yeswehack/vulnerable-code-snippetsYesWeHack present code snippets containing several different vulnerabilities to practice your code analysis in a safe dockerized envoriment. The vulnerable code snippets are suitable for all skill levels.830
👩‍💻IW Weekly #39 : $10,000 Bounty, Zero-click Account Takeover, Stored XSS, Open Redirection Vulnerability, SQL Injection, RCE, Reconnaissance Techniques, and much more…Welcome to the #IWWeekly39 - the Monday newsletter that brings the best in Infosec straight to your inbox. IWCON2022 finally came to a glorious end ❤️ Thank you for joining us.657
How to turn SQL injection into an RCE or a file read? Case study of 128 bug bounty reports📚 Access full case study here: https://members.bugbountyexplained.com/sqli-case-study/ 📧 Subscribe to BBRE Premium: https://bbre.dev/premium ✉️ Sign up for the mailing list: https://bbre.dev/nl 📣 Follow me on Twitter: https://bbre.dev/tw This video is a part of the case study of 128 SQ0
NucleiFuzzer - Powerful Automation Tool For Detecting XSS, SQLi, SSRF, Open-Redirect, Etc.. Vulnerabilities In Web ApplicationsNucleiFuzzer is an automation tool that combines ParamSpider and Nuclei to enhance web application security testing. It uses ParamSpider to identify potential entry points and Nuclei's templates to scan for vulnerabilities.227