What is SQL Injection?
A technique used to take advantage of un-sanitized input to pass SQL commands through a web app for execution by a backend database. It is used to either gain unauthorized access or retrieve info directly from a DB.
What kind of attacks can SQL injection be used to implement?
What type of databases are susceptible to SQL-Injection attacks?
Relational databases.
What is an HTTP Post request?
The POST request carries the requested data as a part of the message body. The string that is submitted to the web server is visible in the body of the HTTP or HTTPS POST request.
What is a SQL query?
A SQL command that is constructed to interact with a backend SQL database.
How does a SQL injection query exploit the normal execution of SQL?
The attacker is able to exploit the application’s inability to filter the request.
What are the main types of SQL Injection?
What are the types of In-Band SQL Injection?
What is a Time-based SQL injection?
A way for attackers to check if a True/False statement is True. This way gets around the Generic error message response so attackers can extract data.
What is Boolean Exploitation?
Where an attacker sends multiple True/False statements (one that they know is true or false) and compare the results to determine if there expression was True or False.
What is a Heavy Query?
A query that retrieves a huge amount of data and in turn, will take a lot of time to execute by using multiple joins. This type of attack is a type of Time-based attack?
What are the steps of the SQL Injection Methodology?
What type of steps are taken in the SQL Injection Info Gathering stage?
Check if web app connects to a DB server, list all input fields, hidden fields, and post requests. Attempt to inject codes to generate errors and evaluate the data in the error messages. Use a string in a number field and vice versa, use a UNION operator to combine the result-set of tow or more SELECT statements.
What are the steps of the SQL Injection Methodology?
What type of steps are taken in the SQL Injection Info Gathering stage?
Check if web app connects to a DB server, list all input fields, hidden fields, and post requests. Attempt to inject codes to generate errors and evaluate the data in the error messages. Use a string in a number field and vice versa, use a UNION operator to combine the result-set of tow or more SELECT statements.
What type of information is extracted through error messages?
It gives you OS, DB system, DB type and version, privilege version, OS interaction level, etc.
What are some ways to generate some errors?
What are some methods to detect SQL injection?
What is Black Box Testing?
Where the attacker does not need to have any knowledge about the network or the system to be tested.
What are the steps involved in Black Box pen testing?
What are the types of Source Code analysis?
What are the steps for performing union SQL Injection?
Extract database name, extract database table, extract Table column names, extract 1st field data.
What is a Second-Order SQL Injection?
Where the attacker inputs a SQL query into a backend database via an HTTP request and it is stored as data. Another request is submitted where the first request data is executed as a query from within.
How can a firewall be bypassed with SQL injection?