Database Hacking with common SQL Injection commands

According to the Open Web Application Security Project (OWASP), command injection is one of the most serious and numerous attacks for web applications.

In addition, these attacks usually result in serious financial loss for companies and other entities, as they are attacks against the database, where it contains valuable information. , such as credit card numbers and personally identifiable information (PII).

OWASP Top 10

database hacking common sql injection commands

Although there are numerous types of attack against databases, the most common is the SQL injection. It SQL injection sends SQL commands from the web form to the backend database.

database hacking common sql injection commands1

If these SQL statements are not cleaned up at the client (browser) level, they can be transferred to the database and cause chaos such as,

  1. Exfiltrate data

  2. Delete data

  3. Add data

  4. Update data

When testing for SQL injection vulnerabilities, these are some of the most common commands and special characters. The better you understand SQL, the more successful you will be with the attack SQL injection.

Notes

Single quote ('): Often for terminating alphanumeric characters.

Double quote (“): Can also be used to terminate alphanumeric characters in some databases.

Comment sequences:

Double dash (–): This is an SQL comment and can be used to invalidate the rest of a query.

Hash (#): In MySQL, it is an alternative way to comment out the rest of the query.

Slash-star (/* … */): Multiline comment.

It can be used to comment out parts or the entire query.

Functions and commands

Period (?): Represents the end of one query and the beginning of another.

Logical operators: AND, OR.

Control functions: UNION, UNION ALL.

Boolean values

TRUE or 1=1: Always evaluates to true and can be used to handle WHERE clauses.

FALSE or 1=0: Always evaluates to false.

Time delay functions

SLEEP(x): In MySQL, causes a delay of x seconds.

WAITFOR DELAY 'hh:mm:ss': In SQL , causes delay.

pg_sleep(x): In PostgreSQL, causes a delay of x seconds.

Retrieving information

@@version: (works on many databases).

CURRENT_USER: Retrieves the current user.

Hex encoding

Attackers may encode their payloads in hexadecimal to bypass the wrong filters.

wild cards

Percentage sign (%): Represents zero or more characters in SQL LIKE clauses. This was used in the recent MoveIT attack by C|op.

Special functions

CONCAT(): Used to concatenate strings in SQL.

CAST(), (): Used for type conversion.

ASCII(), CHAR(): Functions to get ASCII values ​​or characters, can be used in blind SQLi.

Sub-options and metadata queries

… FROM information_schema.tables: Used in databases such as MySQL and PostgreSQL to collect metadata about tables.

SELECT … FROM sysobjects …: Used in SQL Server to collect metadata.

Summary

The Injection attacks on web forms leading to a database leak is one of the most serious attacks that compromise page security.

These database attacks are used in the form of SQLi attacks, where SQL commands are sent to the backend database from unscanned input from the client (browser).

Although SQLi attacks are becoming more and more difficult, a thorough and deep understanding of SQL is necessary to carry out such an attack.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).