SQL Injection In The URL
SQL Injection In The URL
Say we have the below URL
First we produce an error with either ['] or [''] and see how the web app reacts. The next step is to determine the number of columns. An example payload for that is below
You need to keep adding numbers until there is no error back as an output. Once there is no error, your last query dictates the number of columns. Next step is to start crafting your payloads to dumps columns and tables from the database. Make sure to change the URL id to a non-existent value like [0] in the above case. Example payload to determine the database type assuming we got three columns.
Example payload to display tables
Example payload to display columns of the table [hacked]
Example payload to dump username and password from table [users] in [hacked]
Last updated