- Bug Bounty Hunting Essentials
- Carlos A. Lozano Shahmeer Amir
- 201字
- 2021-06-10 18:35:34
Goals of an SQL injection attack for bug bounty hunters
There are a number of reasons why bug bounty hunters would use SQL injection to generate a proof of concept (POC) report:
- Stealing information: A simple POC for a SQL injection attack would be to steal information, such as simple usernames and passwords, and show them as proof of concept to the program owners.
- Feeding false information: When a simple information theft is not sufficient for the program owners and something else is required, it is crucial that you feed false information or update some tables.
- Taking over control: Sometimes, to acquire more bounty and to make your bug bounty report comprehensive, it is important that you show how the SQL injection can be chained to own a machine or gain access to the system.
SQL injection is basically the injection of unauthorized code in SQL statements and it is one of the most common attack mechanisms utilized by hackers to harvest data.
SQL injection is undoubtedly a very critical attack; this is because it is intertidally a dangerous vulnerability and can be chained with other vulnerabilities to perform attacks such as remote code execution, stored XSS, and complete application takeover.
推薦閱讀
- unidbg逆向工程:原理與實踐
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級版)
- .NET安全攻防指南(上冊)
- 防火墻技術與應用(第2版)
- 數字化轉型浪潮下的數據安全最佳實踐指南
- 網絡安全三十六計:人人該懂的防黑客技巧
- Mastering Reverse Engineering
- Mastering Python for Networking and Security
- 功能型密碼算法設計與分析
- 網絡安全監控實戰:深入理解事件檢測與響應
- Manga Studio 5 Beginner's Guide
- 惡意軟件、Rootkit和僵尸網絡
- 商用密碼應用與安全性評估
- Hands-On Application Penetration Testing with Burp Suite
- Burp Suite Essentials