-
LAB 8 : Lab: SQL injection attack, querying the database type and version on MySQL and Microsoft
Problem Statement : This lab contains an SQL injection vulnerability in the product category filter. You can use a UNION attack to retrieve the results from an injected query. To solve the lab, display the database version string. REQUIREMENT IS – Make the database retrieve the string: ‘8.0.31-0ubuntu0.20.04.2’ Understanding: Different Database Syntax Database versions: You can query…
-
Lab 7 : SQL injection attack, querying the database type and version on Oracle
Problem Statement : This lab contains an SQL injection vulnerability in the product category filter. You can use a UNION attack to retrieve the results from an injected query. To solve the lab, display the database version string. Requirements : Make the database retrieve the strings: ‘Oracle Database 11g Express Edition Release 11.2.0.2.0 – 64bit Production, PL/SQL…
-
LAB 6: SQL injection UNION attack, retrieving multiple values in a single column
Problem Statement : This lab contains an SQL injection vulnerability in the product category filter. The results from the query are returned in the application’s response so you can use a UNION attack to retrieve data from other tables. The database contains a different table called users, with columns called username and password. To solve the lab, perform an SQL…
-
Lab 5: SQL injection UNION attack, retrieving data from other tables
Problem Statement : ************************************************************************************************** This lab contains an SQL injection vulnerability in the product category filter. The results from the query are returned in the application’s response, so you can use a UNION attack to retrieve data from other tables. To construct such an attack, you need to combine some of the techniques you learned…
-
Lab 4 : SQL injection UNION attack, finding a column containing text
Problem Statement : This lab contains an SQL injection vulnerability in the product category filter. The results from the query are returned in the application’s response, so you can use a UNION attack to retrieve data from other tables. To construct such an attack, you first need to determine the number of columns returned by…




