SQL Injection Knowledge Base
A comprehensive resource for SQL injection techniques, examples, and bypasses across multiple database platforms.
- MySQL
- MSSQL
- Oracle
- Extras
MySQL
Advanced Techniques
-
Out of Band Channeling
Techniques for exfiltrating data through out-of-band channels in MySQL
-
Stacked Queries
Executing multiple SQL statements in a single injection
-
MySQL-specific Code
MySQL-specific syntax and techniques for SQL injection
-
Fuzzing and Obfuscation
Techniques for bypassing WAFs and filters in MySQL injection
Authentication
Basics
-
Default Databases
Information about MySQL's default database systems
-
MySQL Intro
Overview of MySQL SQL injection techniques and categories
-
Testing Injection
Techniques for testing SQL injection vulnerabilities in MySQL
-
Comment Out Query
Techniques for commenting out the remainder of SQL queries in MySQL
File Operations
Information Gathering
-
Database Credentials
How to retrieve database credentials in MySQL
-
Database Names
How to extract database names from MySQL
-
Server Hostname
How to retrieve the server hostname in MySQL
-
Server MAC Address
How to retrieve the server MAC address in MySQL
-
Tables and Columns
How to discover and extract table and column information in MySQL
-
Privileges
Understanding and checking MySQL privileges for SQL injection attacks
Injection Techniques
MSSQL
Advanced Techniques
-
OPENROWSET Attacks
Exploiting OPENROWSET functionality in MSSQL for advanced attacks
-
System Command Execution
Techniques for executing operating system commands through MSSQL
-
SP_PASSWORD (Hiding Query)
Using SP_PASSWORD to hide SQL queries in MSSQL logs
-
Stacked Queries
Using multiple SQL statements in a single MSSQL injection
-
Fuzzing and Obfuscation
Techniques for bypassing defenses in MSSQL injection
Authentication
Basics
Information Gathering
-
Database Credentials
How to extract database credentials from Microsoft SQL Server
-
Database Names
How to retrieve database names from Microsoft SQL Server
-
Server Hostname
How to retrieve the server hostname in Microsoft SQL Server
-
Tables and Columns
How to discover and extract table and column information in MSSQL
Injection Techniques
Oracle
Advanced Techniques
Basics
Information Gathering
-
Database Credentials
How to extract Oracle database user credentials through SQL injection
-
Database Names
How to enumerate database names in Oracle
-
Server Hostname
Techniques to retrieve the Oracle database server hostname information
-
Tables and Columns
Methods to enumerate database tables and columns in Oracle
Injection Techniques
-
Avoiding Quotations
Techniques to bypass quotation filters in Oracle SQL injection
-
String Concatenation
Techniques for concatenating strings in Oracle SQL injection
-
Conditional Statements
Using Oracle conditional expressions for SQL injection attacks
-
Timing
Using time-based techniques for Oracle SQL injection attacks