Useful Links
Computer Science
Cybersecurity
SQL Injection
1. Introduction to SQL Injection
2. SQL Fundamentals for Security Testing
3. SQL Injection Classification
4. SQL Injection Attack Methodology
5. Advanced SQL Injection Techniques
6. Database-Specific SQL Injection
7. Prevention and Defense Strategies
8. SQL Injection Testing Tools
9. Detection and Monitoring
10. Legal and Ethical Considerations
11. Real-World Case Studies
SQL Injection Classification
In-Band SQL Injection
Characteristics and Detection
Data Retrieval Methods
Error-Based Injection
Database Error Exploitation
Error Message Analysis
Information Extraction Techniques
Database-Specific Error Patterns
UNION-Based Injection
UNION Query Construction
Column Count Determination
Data Type Matching
Information Extraction
Multi-Table Data Retrieval
Inferential SQL Injection
Blind Injection Fundamentals
Detection Challenges
Boolean-Based Blind Injection
True/False Query Construction
Application Response Analysis
Bit-by-Bit Data Extraction
Conditional Logic Exploitation
Time-Based Blind Injection
Time Delay Functions
Response Time Measurement
Timing Attack Techniques
Database-Specific Delay Methods
Out-of-Band SQL Injection
External Communication Channels
Detection Requirements
DNS Exfiltration
DNS Query Triggering
Subdomain Data Encoding
DNS Server Monitoring
HTTP Exfiltration
Server-Side Request Forcing
External Endpoint Monitoring
Data Transmission Methods
Previous
2. SQL Fundamentals for Security Testing
Go to top
Next
4. SQL Injection Attack Methodology