Archive of Notes
All articles related to advanced SQL injection attacks are grouped in this category. You will learn techniques that security professionals and hackers use to find flaws.
-
Minimal SELECT Structure
Posted in NotesSimplifying SELECT statements. It is pretty hard to create a valid query when almost no information about the database or the query is known. This can also make testing pretty difficult. Fortunately, some database management systems support minimal query structures and it is...
Continue reading this entry → -
Implicit Numeric Conversion in SQL
Posted in NotesNumeric values between quotes.. Some database management systems support SQL syntax where numeric values are enclosed between quotes. As I know, only MySQL and SQL Server support this particular syntax. Let’s start with a quick example. It is important to mention here that the...
Continue reading this entry → -
Sqlmap Overview
Posted in SqlmapA quick presentation of sqlmap, a popular SQL injection tool. Sqlmap is an open source SQL injection tool that automates the process of testing and exploiting SQL injection vulnerabilities. The tool being developed in Python, you can use it on any operating system as long as you have a Python...
Continue reading this entry → -
Sqlmap Tutorial
Posted in SqlmapGetting started with sqlmap. Using sqlmap can be tricky when you are not familiar with it. This sqlmap tutorial aims to present the most important functionalities of this popular sql injection tool in a quick and simple way. Before using sqlmap you must first Continue reading this entry →
-
Stored Procedure Attacks
Posted in ProceduresUnderstand SQL injection attacks against stored procedures and functions. It is often believed that stored procedures are not vulnerable to SQL injection attacks, but the reality is totally different. In fact, stored procedures and PL/SQL can be vulnerable to SQLIA. This article covers the different situations...
Continue reading this entry → -
PL/SQL Attacks
Posted in PL/SQLUnderstand SQL injection attacks against PL/SQL. PL/SQL, like stored procedures, can be vulnerable to SQL injection attacks. When PL/SQL code integrates user input into a query and executes it, we encounter exactly the same problem we have when we build a classic dynamic query. In...
Continue reading this entry → -
mysql_real_escape_string SQL injection
Posted in PHPUnderstanding how to safely use mysql_real_escape_string function. PHP provides mysql_real_escape_string() to escape special characters in a string before sending a query to MySQL. This function was adopted by many to escape single quotes in strings and by the same occasion prevent SQL injection attacks. However, it can create...
Continue reading this entry →