• LAB 8 : Lab: SQL injection attack, querying the database type and version on MySQL and Microsoft

    LAB 8 : Lab: SQL injection attack, querying the database type and version on MySQL and Microsoft

    Problem Statement : This lab contains an SQL injection vulnerability in the product category filter. You can use a UNION attack to retrieve the results from an injected query. To solve the lab, display the database version string. REQUIREMENT IS – Make the database retrieve the string: ‘8.0.31-0ubuntu0.20.04.2’ Understanding: Different Database Syntax Database versions: You can query…

  • Lab 7 : SQL injection attack, querying the database type and version on Oracle

    Lab 7 : SQL injection attack, querying the database type and version on Oracle

    Problem Statement : This lab contains an SQL injection vulnerability in the product category filter. You can use a UNION attack to retrieve the results from an injected query. To solve the lab, display the database version string. Requirements : Make the database retrieve the strings: ‘Oracle Database 11g Express Edition Release 11.2.0.2.0 – 64bit Production, PL/SQL…

  • LAB 6: SQL injection UNION attack, retrieving multiple values in a single column

    LAB 6: SQL injection UNION attack, retrieving multiple values in a single column

    Problem Statement : This lab contains an SQL injection vulnerability in the product category filter. The results from the query are returned in the application’s response so you can use a UNION attack to retrieve data from other tables. The database contains a different table called users, with columns called username and password. To solve the lab, perform an SQL…

  • Lab 5: SQL injection UNION attack, retrieving data from other tables

    Lab 5: SQL injection UNION attack, retrieving data from other tables

    Problem Statement : ************************************************************************************************** This lab contains an SQL injection vulnerability in the product category filter. The results from the query are returned in the application’s response, so you can use a UNION attack to retrieve data from other tables. To construct such an attack, you need to combine some of the techniques you learned…

  • Lab 4 : SQL injection UNION attack, finding a column containing text

    Lab 4 : SQL injection UNION attack, finding a column containing text

    Problem Statement : This lab contains an SQL injection vulnerability in the product category filter. The results from the query are returned in the application’s response, so you can use a UNION attack to retrieve data from other tables. To construct such an attack, you first need to determine the number of columns returned by…