Link to this headingSQL Injection
SQL Injection Wiki
SQL Injection CheatSheet
PowerShell Toolkit for Attacking SQL Server
SQL Injection with Code Execution in memory
Auto SQLmap
A Python Framework For NoSQL Scanning and Exploitation
Auto SQLi through google dorking
SQL Injection cheatsheet
Oracle Database Attacking Tool
Microsoft SQL Database Attacking Tool
SQL Vulnerability Scanner
MongoDB auditing and pentesting tool
PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server
Link to this headingSQLMap
Clone from dev for bleeding edge:
Link to this headingInitial information of Injection
Fingerprinting:
Get Database banner:
Get database username, name, and hostname
Link to this headingRun SQLMap via a Request file
Sample Request File
Link to this headingBypassing
Identify WAF
Bypass CSRF:
Tamper Scripts:
Link to this headingChecking Permissions
Check if user is a database admin
Get database users and password hashes
Link to this headingDumping Database
Enumerate databases
Extract data
List tables for one database
List columns for one database
List schema for one database
Other database flags
Execute SQL Query
Append/Prepend SQL Queries
Get backdoor access to sql server | can give shell access
Run from file with threads:
Run from file with threads and level:
Link to this headingTampering:
General Tamper Testing:
MSSQL Tamper Testing:
MySQL Tamper Testing:
Link to this headingBypassing
Link to this headingAkamai Kona Bypass
MIDinstead ofSUBSTRINGLIKEinstead of=/**/instead of aspaceCURRENT_USERinstead ofCURRENT_USER()"instead of'
Final example:
Blogs
- Obfuscated SQL Injection attacks
- Exploiting hard filtered SQL Injections
- MS Access SQL Injection Cheat Sheet
- Joe McCray - Advanced SQL Injection
- SQLi filter evasion and obfuscation
Link to this headingStored Procedure
Stored procedures are only safe if EXEC() is not being used. If you use EXEC() with dynamic content, you’re vulnerable to SQL injections exactly as if you were executing the query manually.