SQL Injection

  1. SQL Injection Attack Methodology
    1. Reconnaissance Phase
      1. Target Application Analysis
        1. Input Point Identification
          1. GET Parameter Testing
            1. POST Data Analysis
              1. Header Manipulation
              2. Vulnerability Probing
                1. Special Character Injection
                  1. Syntax Error Triggering
                    1. Logic Operator Testing
                      1. Response Pattern Analysis
                      2. Injection Point Classification
                        1. Numeric Context Detection
                          1. String Context Detection
                            1. Blind Injection Identification
                          2. Enumeration Phase
                            1. Database Fingerprinting
                              1. Database Type Identification
                                1. Version Detection
                                  1. Feature Availability Assessment
                                  2. Schema Discovery
                                    1. Database Name Enumeration
                                      1. Table Name Extraction
                                        1. Column Name Identification
                                          1. Data Type Determination
                                            1. Relationship Mapping
                                            2. Privilege Assessment
                                              1. Current User Identification
                                                1. Permission Enumeration
                                                  1. Administrative Access Testing
                                                2. Exploitation Phase
                                                  1. Authentication Bypass
                                                    1. Tautology-Based Bypass
                                                      1. Comment-Based Bypass
                                                        1. Logic Manipulation
                                                        2. Data Extraction
                                                          1. Sensitive Data Identification
                                                            1. Systematic Data Retrieval
                                                              1. File System Access
                                                                1. Configuration Data Access
                                                                2. Data Manipulation
                                                                  1. Record Insertion
                                                                    1. Data Modification
                                                                      1. Record Deletion
                                                                        1. Schema Alteration
                                                                        2. Command Execution
                                                                          1. Operating System Command Execution
                                                                            1. File Upload and Execution
                                                                              1. Network Communication
                                                                                1. Persistence Establishment