Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Detailed explanation of MySQL injection

2025-02-24 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

This article mainly explains "the detailed explanation of MySQL injection". Interested friends may wish to have a look. The method introduced in this paper is simple, fast and practical. Now let the editor to take you to learn "the detailed explanation of MySQL injection"!

Introduction

What is a database?

What is SQL injection?

Bypass login

Access to secret data

Check for loopholes

Number of columns found

Solve the fragile part

Looking for MySQL version

Injection of MySQL 5 or above

MySQL 4 injection

Modify the content of the website

Shut down the MySQL server

Loadfile

MySQL Root

Major MySQL commands

Complete the injection tutorial

Update

Bypass login advanced

RF injection SQL injection

URL deceives phishing

Head

Cookie

0x01 ~ introduction

Hello, everyone. For those who don't know me, I am their nightmare. In this tutorial, I'll show you the infamous injection in MySQL from a novice perspective so that all beginners can become successful SQL injectors. Purpose, be sure to check the various functions and websites in PHP and MySQL, they will be of great help to you. Don't be critical about whether I have any grammatical errors in the tutorial because English is not my mother tongue (I am from Saturn rings). Now let's start the SQL injection exercise.

0x02 ~ what is a database

It's just general information.. A database is an application that stores a collection of data. The database provides a variety of API for creating, accessing, and managing the data it owns. And the DB server can be integrated with our Web development so that we can get what we want from the database without too much difficulty. DB may contain a variety of key information, such as user name, password, credit, etc. As a result, databases need to be protected, but many of the database servers running are not secure due to vulnerabilities or improper programming. Just to name a few DB servers, MySQL (open source), MSSQL,MS-ACCESS,Oracle,Postgre SQL (open source), SQLite, etc.

0x03 ~ what is Sql injection?

SQL injection is probably the richest programming flaw on the Internet today. This is a loophole in which unauthorized people can access a variety of critical and private data. SQL injection is not a defect in Web or database servers, but is caused by poor programming practice and inexperience. It is one of the deadliest and easiest attacks to be performed from a remote location.

In SQL injection, we use various commands to interact with the DB server and get all kinds of data from it. In this tutorial, I'll discuss three aspects of SQL injection, namely, bypassing login, accessing confidential data, and modifying page content. So let's move forward in a real exercise.

# 0x04 ~ Bypass login

Suppose a site has a login form that allows only registered users to enter the site. Now, suppose you want to bypass login and enter the site as a legitimate user. If the programmer does not clean up the login script correctly, you may be lucky to be able to enter the site. By interacting with the DB server, you may not need to know the real user name and password to log in to the site. So, isn't that the beauty injected by SQL?

Let's look at an example where the user name admin and password sam207 can log in to the site. Suppose that the SQL query for this is executed as follows:

HTML Code:

SELECT USER from database WHERE username = 'admin'AND password =' xenu'

If the above SELECT command is evaluated as true, the user is granted access to the site. Think about what we can do if we don't have a cleanup script. This opens a door for hackers to gain illegal access to websites.

In this example, an attacker can enter the following user data in the login form:

Username:an or 1=1--password:blank

So, this will make our query as follows:

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report