SQLi

What is SQLi?

Simply put, SQLi enables us to inject custom (malicious) SQL commands. According to OWASP, SQLi was listed as the #1 of its top 10 web vulnerabilities list.

Attack Types/Categories

In-band

In an in-band SQLi attack, the attacker uses the same channel to perform the attack and to receive data about the attack. Here, we have direct, explicit, feedback during the attack.

a

Blind/Inferential

During a blind SQLi attack, the attacker has no immediate feedback. Instead, we must observe the server responses and behavior in order to learn more about the server's structure.

a

Out-of-band

This is an alternative to inferential time-based techniques, especially if the server responses are not very stable (making an inferential time-based attack unreliable). For instance, we can force the victim to send a request to an attacker-controlled server using MS-SQL's xp_dirtree.