πŸ“•
Blog
Ctrlk
  • 🐞Vulnerabilities & Techniques
  • 🚩CTF
  • ✍️Writeups
  • 😈TryHackMe
  • πŸ”±Web-CyberTalents
  • πŸ–‡οΈPentesting & Bug Hunting Tips
  • πŸ’»Port-Swigger Labs
    • XML external entity (XXE) injection
    • DOM-XSS
    • SQL injection
      • Lab: SQL injection vulnerability in WHERE clause allowing retrieval of hidden data
      • Lab: SQL injection vulnerability allowing login bypass
      • Lab: SQL injection UNION attack, determining the number of columns returned by the query
      • Lab: SQL injection UNION attack, finding a column containing text
      • Lab: SQL injection UNION attack, retrieving data from other tables
      • Lab: SQL injection UNION attack, retrieving multiple values in a single column
      • Lab: SQL injection attack, querying the database type and version on Oracle
      • Lab: SQL injection attack, querying the database type and version on MySQL and Microsoft
      • Lab: SQL injection attack, listing the database contents on non-Oracle databases
  • πŸ›œWireless Networks Penetration Testing
  • βš”οΈWi-Fi Attacks
  • πŸ›‘οΈApplication Security
Powered by GitBook
On this page
  1. πŸ’»Port-Swigger Labs
  2. SQL injection

Lab: SQL injection attack, querying the database type and version on MySQL and Microsoft

SQL injection attack, querying the database type and version on MySQL and Microsoft

Like prev ORACLE challenge

PreviousLab: SQL injection attack, querying the database type and version on OracleNextLab: SQL injection attack, listing the database contents on non-Oracle databases

Last updated 2 years ago


https://acea1fc21e0deff0c0a5150000dc0071.web-security-academy.net/filter?category=Gifts
' UNION SELECT @@version, 'def'-- -