BOOK THIS SPACE FOR AD
ARTICLE ADSQL Injection (SQLi) remains one of the most dangerous vulnerabilities in web applications, allowing attackers to manipulate databases, extract sensitive data, and even gain remote access. This cheat sheet focuses on real-world SQLi exploitation with hands-on examples, bypassing security filters, and using tools like Burp Suite and SQLMap.
Before executing SQL injection attacks, set up a safe environment:
Damn Vulnerable Web App (DVWA) — Download HerebWAPP (Buggy Web Application) — Download HereHackTheBox or TryHackMe LabsEnsure you have:
Burp Suite (for manual exploitation)SQLMap (for automated attacks)A vulnerable web application to practiceManual Testing with Basic Payloads
In a login form, test with:
admin' OR '1'='1' --If you get access without a correct password, it’s vulnerable.
Check for errors using:
' OR 1=1 --" OR 1=1 --
' OR 'a'='a' --
If an error occurs (e.g., syntax error or unclosed quotation), the input field is vulnerable.
Enable Burp Suite Proxy and intercept a login request.Modify the username field to admin'--.If authentication succeeds, SQLi is present.Once confirmed vulnerable, extract database info using: