Skip to content

SQL Injection Enumeration Basics

TheGetch edited this page May 14, 2021 · 1 revision

SQL Injection Enumeration Basics

SQL Injection Enumeration Basics

First, before you forget GET SCREENSHOTS!   Now you basically follow the same standard methodology we always do when attacking a new system.

  • Gather Information
  • Enumerate
  • Research
  • Exploit
  • Pivot
  • Repeat

The big questions we need to answer to determine the true impact are:

  • What is the data exposure?
    • User accounts?
    • Passwords?
    • PII?
    • HPII?
    • Classified data?
    • Configurations?
  • What is our access level?
    • Are we a database administrator?
    • Are we unprivileged?
    • Can we modify data through the query?
      • Sometimes we cannot do nested queries, and are effectively read-only

Some of the information you should obtain first is:

  • Database type (Oracle/SQL Server/MySQL/DB2/etc)
  • Database version (full banner)
  • Current database user and groups
  • Host operating system

Then you want to enumerate the database, pull down a list of:

  • Databases
  • Tables
  • Table Schemas
  • Stored procedures
  • Database Users
  • Database User Permissions
  • Active connections

_Sidebar

1. Recon

Ping Sweep

CIDR to IP

2. Enumeration

Services

05. HTTP (80,443,8080,8443,etc.)

3. Exploitation

4. Post Exploiation

5. High Value Information

Hashes

6. Reporting

7. Random Notes/Useful Tidbits

Clone this wiki locally