mirror of
https://github.com/autistic-symposium/sec-pentesting-toolkit.git
synced 2025-05-02 23:05:11 -04:00
MANY
This commit is contained in:
parent
943728662f
commit
d8c1966631
3 changed files with 77 additions and 3 deletions
|
@ -2,9 +2,18 @@
|
|||
|
||||

|
||||
|
||||
* SQL works by building query statements, these statements are intended to be readbale and intuitive.
|
||||
|
||||
|
||||
* A SQL query search can be easily manipulated and assume that a SQL query search is a reliable command. This means that SQL searches are capable of passing, unnoticed, by access control mechanisms.
|
||||
* Using methods of diverting standard authentication and by checking the authorization credentials, you can gain access to important information stored in a database.
|
||||
|
||||
* Exploitation:
|
||||
- Dumping contents from the database.
|
||||
- Inserting new data.
|
||||
- Modifying existing data.
|
||||
- Writing to disk.
|
||||
|
||||
## The Simplest Example
|
||||
|
||||
A parameter passed for a name of a user:
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue