- Bug Bounty Hunting Essentials
- Carlos A. Lozano Shahmeer Amir
- 201字
- 2021-06-10 18:35:34
Goals of an SQL injection attack for bug bounty hunters
There are a number of reasons why bug bounty hunters would use SQL injection to generate a proof of concept (POC) report:
- Stealing information: A simple POC for a SQL injection attack would be to steal information, such as simple usernames and passwords, and show them as proof of concept to the program owners.
- Feeding false information: When a simple information theft is not sufficient for the program owners and something else is required, it is crucial that you feed false information or update some tables.
- Taking over control: Sometimes, to acquire more bounty and to make your bug bounty report comprehensive, it is important that you show how the SQL injection can be chained to own a machine or gain access to the system.
SQL injection is basically the injection of unauthorized code in SQL statements and it is one of the most common attack mechanisms utilized by hackers to harvest data.
SQL injection is undoubtedly a very critical attack; this is because it is intertidally a dangerous vulnerability and can be chained with other vulnerabilities to perform attacks such as remote code execution, stored XSS, and complete application takeover.
推薦閱讀
- 網絡安全意識導論
- 防火墻技術與應用(第2版)
- Testing and Securing Android Studio Applications
- 移動APT:威脅情報分析與數據防護
- 數據安全與隱私計算(第3版)
- Spring Security(Third Edition)
- ARM匯編與逆向工程:藍狐卷·基礎知識
- 云原生安全技術實踐指南
- Building a Home Security System with BeagleBone
- Instant Java Password and Authentication Security
- 網絡關鍵設備安全檢測實施指南
- Cybersecurity Threats,Malware Trends,and Strategies
- 紅藍攻防:技術與策略(原書第3版)
- 黑客攻防從入門到精通:黑客與反黑客工具篇(第2版)
- 互聯網域名國際化與安全技術導論