Injection flaws occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization.
Ans:-
- There are many types of injection vulnerabilities, some of the most common include:
- SQL Injection
- Error based SQLi
- Blind SQLi
- String SQLi
- Blind Numeric SQLi
- Blind String SQLi
- Code injection
- OS Commanding
- LDAP Injection
- XML injection
- XPATH Injection
- SSL injection
- IMAP/SMTP Injection
- Buffer Overflow
- SQL Injection
- All involve allowing untrusted or manipulated request, Commands, or queries to be executed by a web application.
- SQL injection alone continues to be the most common breach paradigm in 2013.
Ans:- Injection vulnerability also present some of the most significant risk when effectively exploited. Some of these risk include:
- Data loss or corruption.
- Data could be stolen.
- Unauthorized access.
- Denial of access.
- Complete host System takeover.
Ans:-
- Use a Vetted Library or Framework.
- Use an API which avoids the use of an interpreter (parameterized).
- Run the application with minimum privileges.
- Escape all special characters used by an interpreter.
- Input Validation/Sanitization, white list only allowed characters.
DEMO
- HTML Injection -Reflected (GET)
- HTML Injection -Reflected (POST)
- HTML Injection -Reflected (URL)
- HTML Injection -Stored (Blog)
- iFrame Injection
- OS Command Injection
- OS Command Injection –Blind
- PHP Code Injection
- Server-Side Includes (SSI) Injection
- SQL Injection (Search/GET)
- SQL Injection (Select/GET)
- SQL Injection (Search/POST)
- SQL Injection (POST/Select)
- SQL Injection (AJAX/JSON/jQuery)
- SQL Injection (CAPTCHA)
- SQL Injection (Login Form/Hero)
- SQL Injection (Login Form/User)
- SQL Injection (SQLite)
- SQL Injection (Drupal)
- SQL Injection -Stored (Blog)
- SQL Injection -Stored (SQLite)
- SQL Injection -Stored (User-Agent)
- SQL Injection -Blind -Boolean-Based
- SQL Injection -Blind -Time-Based
- XML/XPath Injection (Login Form)
- XML/XPath Injection (Search)
Twitter / Hack The Box / CTF Team / Teck_N00bs Community Telegram
Comments