SQL Injection Cheatsheet
Overview
Authentication Bypass
Basic Auth Bypass
-- Username field payloads
admin' or '1'='1'-- -
admin' or 1=1-- -
admin'/**/or/**/1=1-- -
admin' or 'x'='x'-- -
-- Simple comment-out approach (HTB Academy example)
tom'; -- -
-- OR logic bypass approach (HTB Academy example)
tom' OR '1' = '1' -- -
-- Password field (when username is known)
anything' or '1'='1'-- -SQL Comments Deep Dive
Comment Syntax Rules
Why Comments Work
Auth Bypass with Comments
Complex Query Scenarios
Troubleshooting Syntax Errors
Advanced Auth Bypass
UNION Injection
Understanding UNION Clause
What is UNION?
Critical UNION Requirements
How UNION Injection Works
Handling Uneven Columns
HTB Academy Practical Example: employees/departments UNION
Column Detection
Method 1: ORDER BY Technique
Method 2: UNION Technique
Location of Injection (Critical Concept!)
Basic UNION Injection
Step-by-Step UNION Injection Process
Data Extraction via UNION
Database Enumeration
MySQL Fingerprinting
Payload
When to Use
Expected Output (MySQL)
Wrong Output (Other DBMS)
INFORMATION_SCHEMA Database
Step-by-Step Enumeration Process
Step 1: Identify Current Database
Step 2: Discover All Databases
Step 3: Enumerate Tables in Target Database
Step 4: Enumerate Columns in Target Table
Step 5: Extract Data
HTB Academy Practical Example
Quick Reference Payloads
Data Extraction
Privilege and Configuration Enumeration
User Information
Privilege Enumeration
File Operations
Prerequisites: Privilege Verification
Step 1: Identify Current Database User
Step 2: Check Superuser Privileges
Step 3: Enumerate Specific Privileges
Step 4: Check FILE Privilege Restrictions
HTB Academy Complete Walkthrough
Scenario: Reading Application Source Code to Find Database Credentials
Common File Reading Targets
System Information
Web Application Files
Log Files (Information Gathering)
Windows File Reading
Quick Reference: File Reading Payloads
File Writing
Prerequisites Verification (Critical!)
Step 1: Verify secure_file_priv Setting
Step 2: Test Write Permissions
Step 3: Deploy Web Shell
Step 4: Execute Commands
HTB Academy Complete Walkthrough
Scenario: Complete File Writing Attack Chain
Advanced Web Shell Variants
Enhanced Web Shells
Binary Data Writing
Web Root Discovery Techniques
Configuration File Analysis
Common Web Root Locations
Quick Reference: File Writing Payloads
HTB Academy Skills Assessment: Complete Attack Chain
Scenario: Web Application with Login Form β Remote Code Execution β Flag Capture
Phase 1: Authentication Bypass
Phase 2: SQL Injection Discovery & Exploitation
Phase 3: Privilege Enumeration
Phase 4: File Operations
Phase 5: Web Shell Deployment
Phase 6: Flag Capture
Complete Attack Chain Summary
Key Learning Points
Blind SQL Injection
Boolean-based Blind
Time-based Blind
Manual Time-based Payloads
Advanced Time-based Data Extraction
SQLMap Advanced Time-based Attacks
Time-based Performance Optimization
Time-based Troubleshooting
Advanced Time-based Scenarios
Quick Reference: Advanced Time-based
Error-based Injection
MySQL Error-based
SQL Server Error-based
WAF Bypass Techniques
Comment Variations
Case Variations
Character Encoding
Alternative Operators
Second-Order SQL Injection
Concept
Example Payload Storage
Advanced Techniques
Stacked Queries
NoSQL Injection (for comparison)
Prevention and Detection
Secure Coding Practices
Detection Indicators
Quick Reference Commands
Essential Testing Payloads
Tool Integration
SQLMap Comprehensive Cheat Sheet
Prefix/Suffix Customization
Level/Risk Settings
Advanced Tuning Options
Technique Selection
UNION SQLi Tuning
Bypassing Web Application Protections
Script
Description
Use Case
HTB Academy Examples
Quick Reference: Attack Tuning
Advanced Database Enumeration
DBA Privilege Verification
File Read Operations
File Write Operations
Automated OS Shell
Troubleshooting OS Shell Issues
Advanced OS Exploitation Techniques
HTB Academy Examples
Quick Reference: OS Exploitation
Burp Suite Integration
Last updated