πŸ“•
Blog
search
⌘Ctrlk
πŸ“•
Blog
  • 🐞Vulnerabilities & Techniques
  • 🚩CTF
  • ✍️Writeups
  • 😈TryHackMe
  • πŸ”±Web-CyberTalents
  • πŸ–‡οΈPentesting & Bug Hunting Tips
  • πŸ’»Port-Swigger Labs
    • XML external entity (XXE) injection
    • DOM-XSS
    • SQL injection
      • Lab: SQL injection vulnerability in WHERE clause allowing retrieval of hidden data
      • Lab: SQL injection vulnerability allowing login bypass
      • Lab: SQL injection UNION attack, determining the number of columns returned by the query
      • Lab: SQL injection UNION attack, finding a column containing text
      • Lab: SQL injection UNION attack, retrieving data from other tables
      • Lab: SQL injection UNION attack, retrieving multiple values in a single column
      • Lab: SQL injection attack, querying the database type and version on Oracle
      • Lab: SQL injection attack, querying the database type and version on MySQL and Microsoft
      • Lab: SQL injection attack, listing the database contents on non-Oracle databases
  • πŸ›œWireless Networks Penetration Testing
  • βš”οΈWi-Fi Attacks
  • πŸ›‘οΈApplication Security
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. πŸ’»Port-Swigger Labschevron-right
  2. SQL injection

Lab: SQL injection attack, querying the database type and version on MySQL and Microsoft

hashtag
SQL injection attack, querying the database type and version on MySQL and Microsoftarrow-up-right

Like prev ORACLE challenge

PreviousLab: SQL injection attack, querying the database type and version on Oraclechevron-leftNextLab: SQL injection attack, listing the database contents on non-Oracle databaseschevron-right

Last updated 2 years ago


https://acea1fc21e0deff0c0a5150000dc0071.web-security-academy.net/filter?category=Gifts
' UNION SELECT @@version, 'def'-- -