Sql Injection Pentesting Workflow
Quick Reference
Phase
Objective
Key Technique
Phase 1: SQLi Detection & Confirmation
1.1 Injection Point Identification
Payload
URL Encoded
Purpose
1.2 Database Fingerprinting
Phase 2: Authentication Bypass
2.1 Standard Bypass Payloads
2.2 Bypass Decision Tree
Phase 3: Union-Based Injection
3.1 Column Count Enumeration
3.2 Identifying Output Columns
3.3 Data Extraction Templates
Phase 4: Database Enumeration
4.1 Enumeration Workflow
4.2 Enumeration Payloads
4.3 Concatenation for Single-Column Output
Phase 5: Privilege Enumeration
5.1 User Context Assessment
5.2 Administrative Privilege Check
5.3 File Operation Permissions
Phase 6: File Operations
6.1 Reading Files (LOAD_FILE)
File Path
Purpose
6.2 Writing Files (INTO OUTFILE)
Phase 7: Web Shell Deployment
7.1 PHP Web Shell Upload
7.2 Web Shell Usage
7.3 Common Web Root Paths
Distribution/Stack
Web Root
MySQL Operator Precedence
Priority
Operators
MySQL CLI Reference
Connection
Database Operations
Table Operations
Column Operations
Query Modifiers
Payload Quick Reference
Authentication Bypass
Union Injection Template
INFORMATION_SCHEMA Queries
File Operations
Troubleshooting
Issue
Possible Cause
Solution
Resources
Last updated