top of page

A1 - INJECTION

Introduction

Injections can occurs on multiple platforms like LDAP, SQL and SMTP header. For this vulnerability, we will be focusing on SQL injections. Poor coding and error handling on the input field can cause this vulnerability to appear. This is one example on how to showcase if the vulnerability is in the website. With such vulnerability in the system, it can result data loss, data corruption, lack of accountability, denial of access or lead to complete host takeover

Tools needed:
  • BurpSuite

  • SQLinjectme plugin from Firefox

Videos

Automated SQL testing with BurpSuite

True Statement

SQL testing using SQLinjectme

Other possible methods:

Some tips of solving the vulnerability is to:

 

  • Use preg_match to remove the special characters like (",",!,@,#,') or strings like (1=1)

  • Use mysqli_real_escape_string() command on all input field

PENETRATION

Testing

bottom of page