SQL Injection Tutorial
SQL Injection Tutorial
Table of Content
1 What is SQL Injection ............................................................................................................... 2
2 SQL Injection Tutorial .............................................................................................................. 2
2.1 Get Environment Information .......................................................................................... 2
2.1.1 Injectable or Not? ......................................................................................................... 2
2.1.2 Get SQL Injection KeyWord ........................................................................................ 5
2.1.3 Get Database Type ....................................................................................................... 6
2.1.4 Method of Getting Data................................................................................................ 7
2.2 Get Data by SQL Injection ............................................................................................... 8
2.2.1 Get Dabase Name ......................................................................................................... 8
2.2.2 Get Table Name ......................................................................................................... 11
2.2.3 Get Column Name ...................................................................................................... 12
2.2.4 Get Data Record ......................................................................................................... 14
2.3 SQL Injection Tool ......................................................................................................... 15
3 Build Typical Test Environment ............................................................................................. 17
3.1 PHP+MySQL Test Environment .................................................................................... 17
3.2 ASP/ASPX+SQL Server Test Environment .................................................................. 19
4 References ............................................................................................................................... 21
By Janus Security Software (http://www.janusec.com/ )