โ‰๏ธForcefully Generate Errors

Below are some advanced and rare SQL injection techniques for MSSQL, MySQL, and Oracle. These techniques go beyond the basic ones and exploit specific features and configurations of the databases.

MSSQL

OLE Automation Procedures

DECLARE @Object INT;
EXEC sp_OACreate 'WScript.Shell', @Object OUTPUT;
EXEC sp_OAMethod @Object, 'Run', NULL, 'cmd.exe /c whoami > C:\output.txt';

This uses OLE Automation procedures to execute system commands.

----------------------------------------------------------------

XP_CMD Shell with Privilege Escalation

EXEC sp_configure 'show advanced options', 1;
RECONFIGURE;
EXEC sp_configure 'xp_cmdshell', 1;
RECONFIGURE;
EXEC xp_cmdshell 'whoami';

This enables xp_cmdshell to execute system commands if it's not already enabled.

----------------------------------------------------------------

Linked Servers

This technique uses linked servers to run commands on a different server.

----------------------------------------------------------------

MySQL

UDF (User Defined Functions) for Remote Command Execution

This technique involves creating a UDF to execute system commands.

----------------------------------------------------------------

DNS Exfiltration

This exfiltrates data through DNS requests to an attacker-controlled domain.

----------------------------------------------------------------

Binary Log Injections

This exploits the binary log feature to write a web shell.

----------------------------------------------------------------

Oracle

Java Procedures for Command Execution

This uses Java stored procedures to execute system commands.

----------------------------------------------------------------

UTL_FILE Package for File Access

This technique uses the UTL_FILE package to write files to the server.

----------------------------------------------------------------

DBMS_SCHEDULER for Job Execution

This uses DBMS_SCHEDULER to execute jobs that can change database permissions.

Last updated