SQL Injection For Beginners

SQL Injection For Beginners

Introduction to SQL Injection (SQLi)

Overview of SQL Injection

  • The tutorial focuses on Structured Query Language Injection (SQLi), utilizing the Open Web Application Security Project (OWASP) Bricks, a vulnerable web application platform for demonstration.
  • Emphasis is placed on understanding how to manually execute injection payloads and identify vulnerable parameters quickly using automated tools, highlighting the speed of penetration testing.

Exploring the Vulnerable Application

  • The OWASP Bricks site includes various functionalities such as login pages, which serve as a practical example for learning about penetration testing.
  • A "happy journey map" approach is introduced, where users are encouraged to understand expected outcomes from interactions with the web application.

Understanding Database Queries

Analyzing Login Attempts

  • When attempting to log in with incorrect credentials, feedback from the server reveals how it interacts with the database, showcasing potential vulnerabilities.
  • The SQL query structure is examined: SELECT * FROM users WHERE name = 'username' AND password = 'password', illustrating how sensitive data like usernames and passwords are stored.

Bypassing Security Mechanisms

  • Techniques for reconnaissance are discussed, including gathering information about potential usernames through social media or company directories.
  • A demonstration of bypassing security by inputting a true statement (OR 1 = 1) into the password field successfully logs into the site.

Identifying Vulnerabilities

Using Payload Lists

  • Various SQL injection payload lists are introduced that can be used to test input fields for vulnerabilities.
  • The process involves entering different types of payload commands to elicit responses from the server that indicate whether an input field is susceptible to SQL injection attacks.

Automating SQL Injection Testing

Utilizing Burp Suite

  • Introduction of Burp Suite as a tool for intercepting requests made to web applications. This allows testers to analyze POST requests sent during login attempts.
  • Steps are provided on saving intercepted requests into files for further analysis and testing against vulnerabilities using tools like SQLMap.

Automated Testing with SQLMap

Targeting Parameters Automatically

  • Instructions on using SQLMap with saved request files help automate vulnerability detection in specified parameters like username fields.
  • Quick identification of backend database management systems (DBMS), such as MySQL, and their associated vulnerabilities is demonstrated through automated tests.

Results and Recommendations

  • Findings reveal that certain parameters may be injectable; recommendations include implementing security measures against common attack vectors like cross-site scripting (XSS).

Extracting Sensitive Data

Dumping Database Information

  • Techniques for dumping all values from database tables are shown, revealing user information such as usernames and email addresses effectively.

Cracking Password Hashes

  • Demonstration of dictionary-based cracking methods highlights how quickly sensitive data can be accessed if proper security measures aren't in place.

Conclusion and Best Practices

Importance of Security Measures

  • The tutorial concludes by stressing the need for robust security practices against threats posed by SQL injections. Recommendations include monitoring request thresholds and employing web application firewalls.
Video description

// Membership // Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: https://www.youtube.com/channel/UC1szFCBUWXY3ESff8dJjjzw/join // Courses // Full Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/ Full Web Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/ Full Mobile Hacking Course: https://www.udemy.com/course/full-mobile-hacking-course/ // Books // Kali Linux Hacking: https://amzn.to/3IUXaJv Linux Basics for Hackers: https://amzn.to/3EzRPV6 The Ultimate Kali Linux Book: https://amzn.to/3m7cutD // Social Links // Website: https://www.loiliangyang.com Facebook: https://www.facebook.com/Loiliangyang/ Instagram: https://www.instagram.com/loiliangyang/ LinkedIn: https://www.linkedin.com/in/loiliangyang/ // Disclaimer // Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.