The tester has to make a list of all input fields whose values could be used in crafting a SQL query,
including the hidden fields of POST requests and then test them separately,
trying to interfere with the query and to generate an error.
Consider also HTTP headers and Cookies.
The very first test usually consists of adding a single quote (')
or a semicolon (;) to the field or parameter under test.
The first is used in SQL as a string terminator
and, if not filtered by the application,
would lead to an incorrect query.
The second is used to end a SQL statement and, if it is not filtered, it is also likely to generate an error.
The output of a vulnerable field might resemble the following (on a Microsoft SQL Server, in this case):
The tester has to make a list of all input fields whose values could be used in crafting a SQL query,
including the hidden fields of POST requests and then test them separately,
trying to interfere with the query and to generate an error.
Consider also HTTP headers and Cookies.
The very first test usually consists of adding a single quote (')
or a semicolon (;) to the field or parameter under test.
The first is used in SQL as a string terminator
and, if not filtered by the application,
would lead to an incorrect query.
The second is used to end a SQL statement and, if it is not filtered, it is also likely to generate an error.
The output of a vulnerable field might resemble the following (on a Microsoft SQL Server, in this case):
การแปล กรุณารอสักครู่..
