SQL injection (SQLi) is a web security vulnerability that allows an attacker to modify or retrieve data from SQL databases. Attackers can use SQLi to:

How can you check or find SQLI?

Understand the field or parameter or the logic behind the SQL Query and Then make a payload based on that

using operators such as single quote ' to first escape the query and then the main payload

such as:- +OR+ , 1=1, 1=2 etc

also using -- at last to comment out everything after your query and the whole payload will be:- '+OR+1=1--

This type of payload works while fetching an object from an SQL database

effectively escaping characters and constructing a payload that will return the desired results. Here's an optimized version:

'+OR+1=1--

Here's a breakdown of the components:

This payload, when injected into a vulnerable SQL query, will typically result in a true condition being evaluated, effectively bypassing any authentication or filtering logic and potentially allowing unauthorized access to the database.

while there can be different logic and sets of instructions behind the login panel username'-- password can be anything bcoz it can be ignored anyway or we can repeat the payload

Where can we test for SQLI? anywhere if there is a parameter that fetches data from the database This can be known by checking particular requests and looking for fields which does that (fetches data)



Types of SQLI

………….………..