Learning SQL Injection Through PortSwigger Labs (Beginner to Blind SQLi)
This article outlines an SQL injection tutorial using PortSwigger Labs. The goal is to progress from basic SQLi to blind SQL injection. The training platform provides a simple login page with an injectable email field. The researcher discovered SQL injection by inserting single quotes in the email field, which caused an error revealing the presence of SQL code in the application's response. The attack vector involved sending payloads containing single quotes, semicolons, and SQL commands like UNION and SELECT. The mechanism revolves around the application not sanitizing user input, which enables injecting SQL commands to manipulate the underlying database. The impact includes accessing sensitive data, modifying records, and executing arbitrary commands. The tutorial offers a series of challenges to gradually master SQL injection techniques and tools like Burp Suite's Intruder. Proper mitigation requires sanitizing user-supplied data, parameterizing queries, and using prepared statements. Key lesson: Learn SQL injection techniques and tools to prevent data breaches and unauthorized data manipulation. #SQLInjection #Cybersecurity #WebSecurity #PortSwiggerLabs #Infosec

https://fuzzyyduck.medium.com/learning-sql-injection-through-portswigger-labs-beginner-to-blind-sqli-7dd78070afd6?source=rss------bug_bounty-5

Learning SQL Injection Through PortSwigger Labs (Beginner to Blind SQLi)

A practical walkthrough of SQL injection techniques, including login bypass, UNION attacks, and blind SQLi.

Medium
Visible Error-Based SQL Injection

A Portswigger Lab

Medium
Blind SQL Injection with Conditional Errors

A Portswigger Lab

Medium
SQL Injection UNION Attack, Retrieving Multiple Values in a Single Column

This lab contains a SQL injection vulnerability in the product category filter. The results from the query are returned in the application’s response so you can use a UNION attack to retrieve data…

Medium
Cancelling before #OffSec renewal: 'Although much progress has been made over the bad old days of offline only content and no support, the quiz platform and labs are too flaky and actually impair focus (I cannot sit and stare at a timer, idle for 45 sec!). In one module I found the free #PortswiggerLabs much more useful and helpful than the OffSec material. I will run out my year and try to do a little more, but I was never an OSCP candidate and need to focus on other things in the years to come. Cheers! '
SQL Injection UNION Attack, Retrieving Data from Other Tables

This lab contains a SQL injection vulnerability in the product category filter. The results from the query are returned in the application’s response, so you can use a UNION attack to retrieve data…

Medium
SQL Injection UNION Attack, Finding a Column Containing Text

This lab contains a SQL injection vulnerability in the product category filter. The results from the query are returned in the application’s response, so you can use a UNION attack to retrieve data…

Medium
SQL Injection UNION Attack, Determining the Number of Columns Returned by the Query

This lab contains a SQL injection vulnerability in the product category filter. The results from the query are returned in the application’s response, so you can use a UNION attack to retrieve data…

Medium
SQL Injection Attack, Listing the Database Contents on Oracle

This lab contains a SQL injection vulnerability in the product category filter. The results from the query are returned in the application’s response so you can use a UNION attack to retrieve data…

Medium
SQL Injection Attack, Listing the Database Contents on Non-Oracle Databases

This lab contains a SQL injection vulnerability in the product category filter. The results from the query are returned in the application’s response so you can use a UNION attack to retrieve data…

Medium