Related articles: SQL Injection Cheat Sheet
We sometimes carelessly throw characters up and about in an attempt to find a gem. This paper covers miscellaneous injection characters and their meanings when applied to web application testing.
<!--adsense-->
| Character(s) | Details |
| NULL or null | Often produces interesting error messages as the web application is expecting a value. It can also help us determine if the backend is a PL/SQL gateway. |
| {' , " , ; , <!} | Breaks an SQL string or query; used for SQL, XPath and XML Injection tests. |
| {– , = , + , "} | These characters are used to craft SQL Injection queries. |
| {‘ , &, ! , ¦ , < , >} | Used to find command execution vulnerabilities. |
| "><script>alert(1)</script> | Used for basic Cross-Site Scripting Checks. |
| {%0d , %0a} | Carriage Return Line Feed (new line); all round bad. |
| {%7f , %ff} | byte-length overflows; maximum 7- and 8-bit values. |
| {-1, other} | Integer and underflow vulnerabilities. |
| Ax1024+ | Overflow vulnerabilities. |
| {%n , %x , %s} | Testing for format string vulnerabilities. |
| ../ | Directory Traversal Vulnerabilities. |
| {% , _, *} | Wildcard characters can sometimes present DoS issues or information disclosure. |
These characters can be represented in many different ways (i.e. Unicode). It is important to understand this when restricting input to these character sets.
References:
- Mike Shema – Hack Notes
- w3schools
本文深入探讨了SQL注入攻击的原理与测试方法,包括使用各种字符进行注入实验,如NULL、{'、{–等,并通过实例展示了如何利用这些字符进行基本的跨站脚本检查和格式字符串漏洞测试。
824

被折叠的 条评论
为什么被折叠?



