Tuesday, February 17, 2015

SQL Injection Intermediate Level

This is a theoretical post about types of SQL Injection attacks and the concepts behind SQL Injection. I have added this here since so far we had been dealing with URLs, and will continue to do so. For the attacker, there is no direct way to write complete queries and he/she may only make changes to the URL or input form. However, the knowledge of MySQL (or any other DBMS) part of the attack is necessary, since it will be required when you deal with more robust websites where the standard attacks won't work and you need to get creative. Before reading this post, I recommend these 3:-

  • SQL Injection Basics (theoretical yet important)
  • Manual SQL Injection (using web browser only)
  • Automated SQL Injection using SQLMap (Kali Linux needed) 

  • Now we will proceed to the actual content of the post :-

    Types of SQL Injection attacks

    • SQL injection + insufficient authentication
    • SQL injection + DDoS attacks
    • SQL injection + DNS hijacking
    • SQL injection + XSS

    Technical implementations

    Incorrectly filtered escape characters

    This form of SQL injection occurs when user input is not filtered for escape characters and is then passed into a SQL statement. This results in the potential manipulation of the statements performed on the database by the end-user of the application.
    The following line of code illustrates this vulnerability:
    statement = "SELECT * FROM users WHERE name ='" + userName + "';"
    This SQL code is designed to pull up the records of the specified username from its table of users. However, if the "userName" variable is crafted in a specific way by a malicious user, the SQL statement may do more than the code author intended. For example, setting the "userName" variable as:
    ' or '1'='1
    or using comments to even block the rest of the query (there are three types of SQL comments). All three lines have a space at the end:
    ' or '1'='1' -- 
    ' or '1'='1' ({ 
    ' or '1'='1' /* 

    renders one of the following SQL statements by the parent language:
    SELECT * FROM users WHERE name = '' OR '1'='1';
    SELECT * FROM users WHERE name = '' OR '1'='1' -- ';
    If this code were to be used in an authentication procedure then this example could be used to force the selection of a valid username because the evaluation of '1'='1' is always true.
    The following value of "userName" in the statement below would cause the deletion of the "users" table as well as the selection of all data from the "userinfo" table (in essence revealing the information of every user), using an API that allows multiple statements:
    a';DROP TABLE users; SELECT * FROM userinfo WHERE 't' = 't
    This input renders the final SQL statement as follows and specified:
    SELECT * FROM users WHERE name = 'a';DROP TABLE users; SELECT * FROM userinfo WHERE 't' = 't';
    While most SQL server implementations allow multiple statements to be executed with one call in this way, some SQL APIs such as PHP's mysql_query() function do not allow this for security reasons. This prevents attackers from injecting entirely separate queries, but doesn't stop them from modifying queries.

    Incorrect type handling

    This form of SQL injection occurs when a user-supplied field is not strongly typed or is not checked for type constraints. This could take place when a numeric field is to be used in a SQL statement, but the programmer makes no checks to validate that the user supplied input is numeric. For example:
    statement := "SELECT * FROM userinfo WHERE id =" + a_variable + ";"
    It is clear from this statement that the author intended a_variable to be a number correlating to the "id" field. However, if it is in fact a string then the end-user may manipulate the statement as they choose, thereby bypassing the need for escape characters. For example, setting a_variable to
    1;DROP TABLE users
    will drop (delete) the "users" table from the database, since the SQL becomes:
    SELECT * FROM userinfo WHERE id=1;DROP TABLE users;

    Blind SQL injection

    Blind SQL Injection is used when a web application is vulnerable to an SQL injection but the results of the injection are not visible to the attacker. The page with the vulnerability may not be one that displays data but will display differently depending on the results of a logical statement injected into the legitimate SQL statement called for that page. This type of attack can become time-intensive because a new statement must be crafted for each bit recovered. There are several tools that can automate these attacks once the location of the vulnerability and the target information has been established.

    Conditional responses

    One type of blind SQL injection forces the database to evaluate a logical statement on an ordinary application screen. As an example, a book review website uses a query string to determine which book review to display. So the URL http://books.example.com/showReview.php?ID=5 would cause the server to run the query
    SELECT * FROM bookreviews WHERE ID = 'Value(ID)';
    from which it would populate the review page with data from the review with ID 5, stored in the table bookreviews. The query happens completely on the server; the user does not know the names of the database, table, or fields, nor does the user know the query string. The user only sees that the above URL returns a book review. A hacker can load the URLs http://books.example.com/showReview.php?ID=5 OR 1=1 and http://books.example.com/showReview.php?ID=5 AND 1=2, which may result in queries
    SELECT * FROM bookreviews WHERE ID = '5' OR '1'='1';
    SELECT * FROM bookreviews WHERE ID = '5' AND '1'='2';
    respectively. If the original review loads with the "1=1" URL and a blank or error page is returned from the "1=2" URL, and the returned page has not been created to alert the user the input is invalid, or in other words, has been caught by an input test script, the site is likely vulnerable to a SQL injection attack as the query will likely have passed through successfully in both cases. The hacker may proceed with this query string designed to reveal the version number of MySQL running on the server:
    http://books.example.com/showReview.php?ID=5 AND substring(@@version,1,1)=4
    , which would show the book review on a server running MySQL 4 and a blank or error page otherwise. The hacker can continue to use code within query strings to glean more information from the server until another avenue of attack is discovered or his or her goals are achieved.

    Second Order SQL Injection

    Second order SQL injection occurs when submitted values contain malicious commands that are stored rather than executed immediately. In some cases, the application may correctly encode a SQL statement and store it as valid SQL. Then, another part of that application without controls to protect against SQL injection might execute that stored SQL statement. This attack requires more knowledge of how submitted values are later used. Automated web application security scanners would not easily detect this type of SQL injection and may need to be manually instructed where to check for evidence that it is being attempted.

    This post is licensed under Creative Commons Attribution-ShareAlike 3.0. This license permits sharing, but requires attribution and that the content be shared under same or similar license . The source of the content in this page is -
    License details can be read here https://en.wikipedia.org/wiki/Wikipedia:Text_of_Creative_Commons_Attribution-ShareAlike_3.0_Unported_License

    Blind SQLi Tutorial

    You may read this tutorial if you have gone through the content of this page and are ready to go to the next level.


    1. a post full of waste...we can this all this stuff on youtube or wikipedia..teach us some real hacks dude..

      1. Try this http://www.kalitutorials.net/2015/02/blind-sql-injection.html

      2. seriously..a post full of waste..anyone knows about sql injection dude..teach us how to perform that...attack..

      3. You sound like a little script kiddie. Go back to trying to hack your grandmothers WEP AP you turd.
        This man is devoting his time to churning out these tutorials for the lowest common denominator.
        Be a little more humble you pissant

      4. Hello world
        We Only Make - The boss

        Reseller :- Hacking Tools & Hacking services, Also Teach Hacking Methods Via teem weaver or Anydesk,
        Each Method Take minimum 1 hour to learn with vedio Tutorial And Hacking Tools ,

        How to Make Money With Method & luck ,

        - Spamming & Tools ,
        - Carding & Tools ,
        - Virus with control panal and Spy bot files,
        - Virus With Builder And Crypter ,
        - Scanners with Bruters ,
        - Crypters with Doc Exploits ,pdf Exploits ,TExtfile Exploits ,
        - PHP Exploits with shell and mailer
        - OTP verications Bypass with Bulletproof Scam-page and Otp control
        - Company Ceo or cfo leads Any country
        - Rat virus with builder
        - Cookies Stealers and Builder
        - keyloger and builder
        - Credit card Scam-pages
        - Bank login Scam-pages
        - debit card topup scam page
        - donation scam-page
        - dhl login and tracking scam-page
        - fedax login and tracking scam-page
        - Shipping Tools

        Place & Ground
        learners you will pay cheap $ for demo Tools & Method

        Business grounds

        Credit card Low Interest Services,

        - Credit card with Fullz Information - Minimum Investment 150$ - With 50k Credit limit And balance
        - Debit Card Topup AS per Card limit - Minimum Investment 200$ - With 8000$ balance
        - Dating scam Fresh male female Logins - Minimum Investment 80$ - Dating Login upto 30
        - Tex refund Scam leads - Minimum Investment 200$ - Result upto 5000 in 10 days
        - payments and Bills - Minimum Investment 300$ - upto 7000$
        - Wester union Minimum Transfer 2000$ - Transfer Fess 400$
        ABOUT US :
        Icq :-675452902
        Skype: rushr00t000
        email me:- hackitbackd00r@gmail.com

    2. How about hosted pages of Mikrotik system? Does Injection work ?!

    3. Very innovative post, thanks

    4. copy paste from wiki xD

    5. good commands. very helpful.


    6. BEST WAY TO HAVE GOOD AMOUNT TO START A GOOD BUSINESS or TO START LIVING A GOOD LIFE..... Hack and take money directly from any ATM Machine Vault with the use of ATM Programmed Card which runs in automatic mode. email (williamshackers@hotmail.com) for how to get it and its cost . .......... EXPLANATION OF HOW THESE CARD WORKS.......... You just slot in these card into any ATM Machine and it will automatically bring up a MENU of 1st VAULT $5,000, 2nd VAULT $10,000, RE-PROGRAMMED, EXIT, CANCEL. Just click on either of the VAULTS, and it will take you to another SUB-MENU of ALL, OTHERS, EXIT, CANCEL. Just click on others and type in the amount you wish to withdraw from the ATM and you have it cashed instantly... Done. ***NOTE: DON'T EVER MAKE THE MISTAKE OF CLICKING THE "ALL" OPTION. BECAUSE IT WILL TAKE OUT ALL THE AMOUNT OF THE SELECTED VAULT. email (williamshackers@hotmail.com). We are located in USA.

    7. Guys it no longer questionable when it comes to (HACKING). I am good in what I do Hacking.

      I am tire of showing you guys list of what I do and good at, no matter what it is you WANT just bring it on I will Hack it for you

      All you need do just Email:- pointekhack@gmail.com and your job shall be done with %100✓ guarantee

    8. i was lost with no hope for my wife was cheating and had always got away with it because i did not know how or always too scared to pin anything on her. with the help a friend IN PERSON OFJOHN who recommended me to who help hack her phone, email, chat, sms and expose her for a cheater she is. I just want to say a big thank you to HACKINTECHNOLOGY@GMAIL.COM . am sure someone out there is looking for how to solve his relationship problems, you can also contact him for all sorts of hacking job..he is fast and reliable. you could also text +1 669 225 2253

    9. contact : elizabethjone146@gmail.com WhatsApp +18573255825 Do you want to hack your cheating spouse Email, whatsapp, Facebook, instagram or any social network?
      Do you need to retrieve your stolen bitcoin?
      Do you need to increase your credit score?
      Do you intend to upgrade your school grade?
      Do you need any information concerning any database.
      Do you need to retrieve deleted files?
      Do you need to clear your criminal records or DMV?
      Do you want to remove any site or link from any blog?
      you should contact this hacker, he is reliable and good at the hack jobs..
      contact : elizabethjone146@gmail.com WhatsApp +18573255825

    10. contact : elizabethjone146@gmail.com WhatsApp +18573255825 Do you want to hack your cheating spouse Email, whatsapp, Facebook, instagram or any social network?
      Do you need to retrieve your stolen bitcoin?
      Do you need to increase your credit score?
      Do you intend to upgrade your school grade?
      Do you need any information concerning any database.
      Do you need to retrieve deleted files?
      Do you need to clear your criminal records or DMV?
      Do you want to remove any site or link from any blog?
      you should contact this hacker, he is reliable and good at the hack jobs..
      contact : elizabethjone146@gmail.com WhatsApp +18573255825


    © Kali Tutorials, 2016. Unauthorized use and/or duplication of this material without express and written permission from this site’s author and/or owner is strictly prohibited. Excerpts and links may be used, provided that full and clear credit is given to Shashwat Chaudhary and Kali Tutorials with appropriate and specific direction to the original content.
    Bitcoin: 1B5aLqJcMW7zznffTxQwta8JTZsxBDPguC