Back to directory
WRITEUP #1135

Utilizing Historical URLs of an Organization to successfully execute SQL queries — Blind SQLi

SQL InjectionBlind SQL injection
by@AayushVishnoi10(Aayush Vishnoi)
Program
-
Published
May 26, 2023
Added to HackDex
Jun 5, 2023
Read Full Writeuphttps://medium.com/@ar_hawk/utilizing-historical-urls-of-an-organization-to-successfully-execute-sql-queries-blind-sqli-3526d9c3863d
RELATED WRITEUPS
Directory Traversal, SQL Injection and Server-Side Request Forgery
SQL InjectionPath traversal
Breaking Down Barriers: Exploiting Pre-Auth SQL Injection In WhatsUp Gold - CVE-2024-6670
SQL InjectionReverse engineering
Bypassing airport security via SQL injection
SQL Injection
World of SELECT-only PostgreSQL Injections: (Ab)using the filesystem
SQL Injection
Exploiting authorization by nonce in WordPress plugins
RCEArbitrary file upload

Built with ❤️ by Shubham Rawat