This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "SQL Injection Cookbook template"

From OWASP
Jump to: navigation, search
Line 3: Line 3:
 
==Tables==
 
==Tables==
 
===List table names===
 
===List table names===
===Create a table===
 
 
===List columns for a specific table===
 
===List columns for a specific table===
 
===View table permissions===
 
===View table permissions===
 
===Change table permissions===
 
===Change table permissions===
 +
===Create a table===
  
 
==Stored procedures or functions==
 
==Stored procedures or functions==
Line 34: Line 34:
 
===Operating System version===
 
===Operating System version===
 
===OS environment variables===
 
===OS environment variables===
===Execute OS shell commands===
+
===Execute OS shell command===
 
===Read file contents===
 
===Read file contents===
 
===Arbitrary file writes===
 
===Arbitrary file writes===
Line 51: Line 51:
 
===Tableless queries===
 
===Tableless queries===
 
===Query comments===
 
===Query comments===
===Query command delimiters===
+
===Command delimiters===
 
===Set operators===
 
===Set operators===
 
Set operators are used to combine the results from two different queries. The number of columns and order of column types must be identical for both queries. The general syntax is
 
Set operators are used to combine the results from two different queries. The number of columns and order of column types must be identical for both queries. The general syntax is

Revision as of 04:20, 16 January 2007

Database objects

Tables

List table names

List columns for a specific table

View table permissions

Change table permissions

Create a table

Stored procedures or functions

List stored procedures or functions

Parameters for a stored procedure or function

Source code of a stored procedure or function

Create a stored procedure or function

System data

Users

Identify current user

List of database users

List of database administrators

Database user permissions

Create a new user

Change a user password

Delete a user

Database server

View database server settings

Change database server settings

View database server processes

Kill database server process

Host Operating System

Operating System version

OS environment variables

Execute OS shell command

Read file contents

Arbitrary file writes

File uploads

Queries

Strings

Valid string delimiters

String concatenation

String-based queries with no quote characters

Query syntax

Result row count limiters

Acceptable whitespace

Tableless queries

Query comments

Command delimiters

Set operators

Set operators are used to combine the results from two different queries. The number of columns and order of column types must be identical for both queries. The general syntax is

 SELECT
    fname, lname
 FROM 
    employees
 SET_OPERATOR
 SELECT
    fname, lname
 FROM
    customers

Special queries

Single column queries

Single row queries

Functions, etc.

Data type casting

Query output to file

Attacks

Breaking out of a query

WHERE clauses

FROM clauses

Other parts of a SELECT

INSERT statements

UPDATE statements

Timing attacks

SQL Tautologies

A tautology is something that is inherently true. SQL tautologies are used when you want to force a query to return all results, basically ignoring any WHERE conditionals. Simple tautologies like " OR 1=1" are useful, but may be filtered out by some security tools. The table below offers a number of tautologies that filter writers (even on well known commercial tools) may not have considered.

Statement Numeric

(1 = 1)

String

('a' = 'a')

Binary

(0x1 = 0x1)

a = a X X X

Data exfiltration

E-mail

Web

General network

Platform specific

Unique database platform features

Authoritative documentation resources

Links