This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "SQL Injection Cookbook template"

From OWASP
Jump to: navigation, search
(Reverting to last version not containing links to www.textbocdartac4tc.com)
 
(24 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 +
__TOC__
 +
=Database objects=
 +
==Tables==
 +
===List table names===
 +
===List columns for a specific table===
 +
===View table permissions===
 +
===Change table permissions===
 +
===Create a table===
  
==Meta-data==
+
==Stored procedures or functions==
Data about data
+
===List stored procedures or functions===
 +
===Parameters for a stored procedure or function===
 +
===Source code of a stored procedure or function===
 +
===Create a stored procedure or function===
  
===List of table names===
 
How to get a list of table names
 
  
===List of columns for a specific table===
+
=System data=
 +
==Users==
 +
===Identify current user===
 +
===List of database users===
 +
===List of database administrators===
 +
===Database user permissions===
 +
===Create a new user===
 +
===Change a user password===
 +
===Delete a user===
  
Information about the indexes of a specific table
+
==Database server==
 +
===View database server settings===
 +
===Change database server settings===
 +
===View database server processes===
 +
===Kill database server process===
  
+
==Host Operating System==
 +
===Operating System version===
 +
===OS environment variables===
 +
===Execute OS shell command===
 +
===Read file contents===
 +
===Arbitrary file writes===
 +
===File uploads===
  
List of stored procedures
 
  
Parameters for stored procedures
+
=Queries=
 +
==Strings==
 +
===Valid string delimiters===
 +
===String concatenation===
 +
===String-based queries with no quote characters===
  
Source code of stored procedures
+
==Query syntax==
 +
===Result row count limiters===
 +
===Acceptable whitespace===
 +
===Tableless queries===
 +
===Query comments===
 +
===Command delimiters===
 +
===Set operators===
 +
Set operators are used to combine the results from two different queries. The number of columns and order of column types must be identical for both queries. The general syntax is
  
+
  SELECT
 +
    fname, lname
 +
  FROM
 +
    employees
 +
  '''''SET_OPERATOR'''''
 +
  SELECT
 +
    fname, lname
 +
  FROM
 +
    customers
  
List of database users
+
==Special queries==
 +
===Single column queries===
 +
===Single row queries===
  
Database user permissions
+
==Functions, etc.==
 +
===Data type casting===
 +
===Query output to file===
  
Database server settings
+
=Attacks=
 +
==Breaking out of a query==
 +
===WHERE clauses===
 +
===FROM clauses===
 +
===Other parts of a SELECT===
 +
===INSERT statements===
 +
===UPDATE statements===
  
   
+
==Inference and timing attacks==
 +
==SQL Tautologies==
 +
A tautology is something that is inherently true. SQL tautologies are used when you want to force a query to return all results, basically ignoring any WHERE conditionals. Simple tautologies like " OR 1=1" are useful, but may be filtered out by some security tools. The table below offers a number of tautologies that filter writers (even on well known commercial tools) may not have considered.  
 +
{| style="width:75%;" border="1" cellspacing="0" cellpadding="5"
 +
! width="55%"|Statement
 +
! width="15%"|Numeric
 +
(1 = 1)
 +
! width="15%"|String
 +
('a' = 'a')
 +
! width="15%"|Binary
 +
(0x1 = 0x1)
 +
|-
 +
| '''''a''''' = '''''a'''''
 +
| align="center" | X
 +
| align="center" | X
 +
| align="center" | X
 +
|}
  
+
=Data exfiltration=
 +
==E-mail==
 +
==Web==
 +
==General network==
  
How to perform:
 
  
Data type casting
+
=Platform specific=
 
+
==Unique database platform features==
String-based queries with no quote characters
+
==Authoritative documentation resources==
 
+
==Links==
SQL tautology attacks
 

Latest revision as of 18:28, 27 May 2009

Database objects

Tables

List table names

List columns for a specific table

View table permissions

Change table permissions

Create a table

Stored procedures or functions

List stored procedures or functions

Parameters for a stored procedure or function

Source code of a stored procedure or function

Create a stored procedure or function

System data

Users

Identify current user

List of database users

List of database administrators

Database user permissions

Create a new user

Change a user password

Delete a user

Database server

View database server settings

Change database server settings

View database server processes

Kill database server process

Host Operating System

Operating System version

OS environment variables

Execute OS shell command

Read file contents

Arbitrary file writes

File uploads

Queries

Strings

Valid string delimiters

String concatenation

String-based queries with no quote characters

Query syntax

Result row count limiters

Acceptable whitespace

Tableless queries

Query comments

Command delimiters

Set operators

Set operators are used to combine the results from two different queries. The number of columns and order of column types must be identical for both queries. The general syntax is

 SELECT
    fname, lname
 FROM 
    employees
 SET_OPERATOR
 SELECT
    fname, lname
 FROM
    customers

Special queries

Single column queries

Single row queries

Functions, etc.

Data type casting

Query output to file

Attacks

Breaking out of a query

WHERE clauses

FROM clauses

Other parts of a SELECT

INSERT statements

UPDATE statements

Inference and timing attacks

SQL Tautologies

A tautology is something that is inherently true. SQL tautologies are used when you want to force a query to return all results, basically ignoring any WHERE conditionals. Simple tautologies like " OR 1=1" are useful, but may be filtered out by some security tools. The table below offers a number of tautologies that filter writers (even on well known commercial tools) may not have considered.

Statement Numeric

(1 = 1)

String

('a' = 'a')

Binary

(0x1 = 0x1)

a = a X X X

Data exfiltration

E-mail

Web

General network

Platform specific

Unique database platform features

Authoritative documentation resources

Links