AI CyberSec Solutions 🛡️(@AI_CyberSec) 's Twitter Profile Photo

🛡️ SQL Injection Cyber Attacks Explained 🔍

🌐Join us as we unravel the intricacies of SQL Injection attacks, providing insights and strategies for a safer digital world.🔒

account_circle
Olajeedae Jr 🇳🇬(@r007User) 's Twitter Profile Photo

New Upload ⚠️
SQL injection attack, querying the database type and version on MySQL and Microsoft

(Manual exploitation & Scripting)

youtu.be/O9f-H3vk494

account_circle
Lu3ky13 ⚡️⚡️(@lu3ky13) 's Twitter Profile Photo

SQL Injection

After this, I used ghauri to extract the database It was successful

-11+PROCEDURE+ANALYSE(EXTRACTVALUE(9859,CONCAT(0x5c,(BENCHMARK(110000000,MD5(0x7562756f))))),1)--

tips

SQL Injection

After this, I used ghauri to extract the database It was successful

-11+PROCEDURE+ANALYSE(EXTRACTVALUE(9859,CONCAT(0x5c,(BENCHMARK(110000000,MD5(0x7562756f))))),1)--

#sqlinjection #ghauri #bugbounty #bugbountytips
account_circle
N$ 🍥(@nav1n0x) 's Twitter Profile Photo

Another day, another Injection . This time, it's in the User-Agent header, leading a full database takeover. Keep testing SQLi on everything and everywhere... injection .

Another day, another #SQLInjection. This time, it's in the User-Agent  header, leading a full database takeover. Keep testing SQLi on  everything and everywhere... #SQL #SQLinjection #BugBounty.
account_circle
N$ 🍥(@nav1n0x) 's Twitter Profile Photo

My first-ever SQL injection in Oracle: SQLMap couldn't find any exploits, but Ghauri was successful here. Using my same old tactic, scraped URLs using WBU and manually tested URLs older than 2-3 years.

My first-ever SQL injection in Oracle: SQLMap couldn't find any  exploits, but Ghauri was successful here. Using my same old tactic, scraped URLs using WBU and manually tested URLs older than 2-3 years. #BugBounty #SQLInjection #Oracle
account_circle
N$ 🍥(@nav1n0x) 's Twitter Profile Photo

ℹ️Sending payload within the URL/URI itself can also trigger SQL injection. So don't just focus on the parameters.

ℹ️Sending payload within the URL/URI itself can also trigger SQL injection. So don't just focus on the parameters. #SQLInjection #BugBounty
account_circle