Difference between revisions of "SQL Injection Cookbook template"

From OWASP
Jump to: navigation, search
(SQL Tautologies)
(SQL Tautologies)
Line 85: Line 85:
 
==Timing attacks==
 
==Timing attacks==
 
==SQL Tautologies==
 
==SQL Tautologies==
{| border="1" cellspacing="0"  
+
{| border="1" cellspacing="0" cellpadding="5" align="center"
cellpadding="5" align="center"
+
 
! Statement
 
! Statement
 
! Numeric
 
! Numeric
Line 96: Line 95:
 
|-  
 
|-  
 
| a = a
 
| a = a
| X
+
| align="center" | X  
| X
+
| align="center" | X  
| X
+
| align="center" | X
|-
+
|
+
|
+
|
+
|
+
 
|}
 
|}
  

Revision as of 02:11, 14 January 2007

Contents

Database objects

Tables

List table names

Create a table

List columns for a specific table

View table permissions

Change table permissions

Stored procedures or functions

List stored procedures or functions

Parameters for a stored procedure or function

Source code of a stored procedure or function

Create a stored procedure or function

System data

Users

Identify current user

List of database users

List of database administrators

Database user permissions

Create a new user

Change a user password

Delete a user

Database server

View database server settings

Change database server settings

View database server processes

Kill database server process

Host Operating System

Operating System version

OS environment variables

Execute OS shell commands

Read file contents

Arbitrary file writes

File uploads

Unique database platform features

Queries

Strings

Valid string delimiters

String concatenation

String-based queries with no quote characters

Query syntax

Acceptable whitespace

Tableless queries

Query comments

Query command delimiters

Set operators

Set operators are used to combine the results from two different queries. The number of columns and order of column types must be identical for both queries. The general syntax is

 SELECT
    fname, lname
 FROM 
    employees
 SET_OPERATOR
 SELECT
    fname, lname
 FROM
    customers

Special queries

Single column queries

Single row queries

Functions, etc.

Data type casting

Query output to file

Attacks

Breaking out of a query

WHERE clauses

FROM clauses

Other parts of a SELECT

INSERT statements

UPDATE statements

Timing attacks

SQL Tautologies

Statement Numeric

(1 = 1)

String

('a' = 'a')

Binary

(0x1 = 0x1)

a = a X X X

Data exfiltration

E-mail

Web

General network