<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Web Attacks on Welcome to noobsec</title>
    <link>https://www.noobsec.net/tags/web-attacks/</link>
    <description>Recent content in Web Attacks on Welcome to noobsec</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-us</language>
    <lastBuildDate>Wed, 29 Jul 2020 13:10:00 +0000</lastBuildDate><atom:link href="https://www.noobsec.net/tags/web-attacks/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>MySQL Injection Cheatsheet</title>
      <link>https://www.noobsec.net/sqli-cheatsheet/</link>
      <pubDate>Wed, 29 Jul 2020 13:10:00 +0000</pubDate>
      
      <guid>https://www.noobsec.net/sqli-cheatsheet/</guid>
      <description>&lt;!-- end-chunk --&gt;
&lt;!-- begin-chunk data-anchor=&#34;mysql-injection-cheatsheet&#34; --&gt;

&lt;h1 class=&#34;header-anchor-wrapper&#34;&gt;MySQL Injection cheatsheet
  &lt;a href=&#34;#mysql-injection-cheatsheet&#34; class=&#34;header-anchor-link&#34;&gt;
&lt;svg
    xmlns=&#34;http://www.w3.org/2000/svg&#34;
    width=&#34;1rem&#34; height=&#34;1rem&#34; viewBox=&#34;0 0 24 24&#34; fill=&#34;none&#34;
    stroke=&#34;currentColor&#34; stroke-width=&#34;2&#34; stroke-linecap=&#34;round&#34;
    stroke-linejoin=&#34;round&#34;&gt;
    &lt;line x1=&#34;4&#34; y1=&#34;9&#34; x2=&#34;20&#34; y2=&#34;9&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;4&#34; y1=&#34;15&#34; x2=&#34;20&#34; y2=&#34;15&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;10&#34; y1=&#34;3&#34; x2=&#34;8&#34; y2=&#34;21&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;16&#34; y1=&#34;3&#34; x2=&#34;14&#34; y2=&#34;21&#34;&gt;&lt;/line&gt;
&lt;/svg&gt;

&lt;/a&gt;
&lt;/h1&gt;

&lt;!-- end-chunk --&gt;
&lt;!-- begin-chunk data-anchor=&#34;testing-checklist&#34; --&gt;

&lt;h2 class=&#34;header-anchor-wrapper&#34;&gt;Testing checklist
  &lt;a href=&#34;#testing-checklist&#34; class=&#34;header-anchor-link&#34;&gt;
&lt;svg
    xmlns=&#34;http://www.w3.org/2000/svg&#34;
    width=&#34;1rem&#34; height=&#34;1rem&#34; viewBox=&#34;0 0 24 24&#34; fill=&#34;none&#34;
    stroke=&#34;currentColor&#34; stroke-width=&#34;2&#34; stroke-linecap=&#34;round&#34;
    stroke-linejoin=&#34;round&#34;&gt;
    &lt;line x1=&#34;4&#34; y1=&#34;9&#34; x2=&#34;20&#34; y2=&#34;9&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;4&#34; y1=&#34;15&#34; x2=&#34;20&#34; y2=&#34;15&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;10&#34; y1=&#34;3&#34; x2=&#34;8&#34; y2=&#34;21&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;16&#34; y1=&#34;3&#34; x2=&#34;14&#34; y2=&#34;21&#34;&gt;&lt;/line&gt;
&lt;/svg&gt;

&lt;/a&gt;
&lt;/h2&gt;

&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Name&lt;/th&gt;
          &lt;th&gt;Character&lt;/th&gt;
          &lt;th&gt;Function&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;Single quote&lt;/td&gt;
          &lt;td&gt;&lt;code&gt;&#39;&lt;/code&gt;&lt;/td&gt;
          &lt;td&gt;String terminator&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Semi colon&lt;/td&gt;
          &lt;td&gt;&lt;code&gt;;&lt;/code&gt;&lt;/td&gt;
          &lt;td&gt;Query terminator&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Comment&lt;/td&gt;
          &lt;td&gt;&lt;code&gt;-- -&lt;/code&gt;&lt;/td&gt;
          &lt;td&gt;Removes the rest of the query&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Comment&lt;/td&gt;
          &lt;td&gt;&lt;code&gt;#&lt;/code&gt;&lt;/td&gt;
          &lt;td&gt;Removes the rest of the query&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Comment&lt;/td&gt;
          &lt;td&gt;&lt;code&gt;/*comment this*/&lt;/code&gt;&lt;/td&gt;
          &lt;td&gt;Can be placed anywhere in a query, used for bypassing weak filters&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Single quote with a comment&lt;/td&gt;
          &lt;td&gt;&lt;code&gt;&#39;-- -&lt;/code&gt;&lt;/td&gt;
          &lt;td&gt;End a string and remove rest of the query&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Single quote, semi colon and a comment&lt;/td&gt;
          &lt;td&gt;&lt;code&gt;&#39;;-- -&lt;/code&gt;&lt;/td&gt;
          &lt;td&gt;End a string, end query, and remove rest of the query&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;OR operator&lt;/td&gt;
          &lt;td&gt;&lt;code&gt;OR 1=1-- -&lt;/code&gt;&lt;/td&gt;
          &lt;td&gt;For integers, &lt;code&gt;true&lt;/code&gt; test&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;OR operator&lt;/td&gt;
          &lt;td&gt;&lt;code&gt;OR 1=2-- -&lt;/code&gt;&lt;/td&gt;
          &lt;td&gt;For integers, &lt;code&gt;false&lt;/code&gt; test&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;OR operator&lt;/td&gt;
          &lt;td&gt;&lt;code&gt;&#39; OR &#39;1&#39;=&#39;1&#39;-- -&lt;/code&gt;&lt;/td&gt;
          &lt;td&gt;For strings, &lt;code&gt;test&lt;/code&gt; test&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;AND operator&lt;/td&gt;
          &lt;td&gt;&lt;code&gt;AND 1=1-- -&lt;/code&gt;&lt;/td&gt;
          &lt;td&gt;For integers, &lt;code&gt;true&lt;/code&gt; test&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;AND operator&lt;/td&gt;
          &lt;td&gt;&lt;code&gt;AND 1=2-- -&lt;/code&gt;&lt;/td&gt;
          &lt;td&gt;For integers, &lt;code&gt;false&lt;/code&gt; test&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;AND operator&lt;/td&gt;
          &lt;td&gt;&lt;code&gt;&#39; AND &#39;1&#39;=&#39;1&#39;-- -&lt;/code&gt;&lt;/td&gt;
          &lt;td&gt;For strings, &lt;code&gt;true&lt;/code&gt; test&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Arithmetic&lt;/td&gt;
          &lt;td&gt;&lt;code&gt;?id=2-1&lt;/code&gt;&lt;/td&gt;
          &lt;td&gt;For integers, arithmetic operation would load the resultant post&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;Sleep function&lt;/td&gt;
          &lt;td&gt;&lt;code&gt;OR sleep(5)-- -&lt;/code&gt;&lt;/td&gt;
          &lt;td&gt;Blind test&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;!-- end-chunk --&gt;
&lt;!-- begin-chunk data-anchor=&#34;functions&#34; --&gt;

&lt;h2 class=&#34;header-anchor-wrapper&#34;&gt;Functions
  &lt;a href=&#34;#functions&#34; class=&#34;header-anchor-link&#34;&gt;
&lt;svg
    xmlns=&#34;http://www.w3.org/2000/svg&#34;
    width=&#34;1rem&#34; height=&#34;1rem&#34; viewBox=&#34;0 0 24 24&#34; fill=&#34;none&#34;
    stroke=&#34;currentColor&#34; stroke-width=&#34;2&#34; stroke-linecap=&#34;round&#34;
    stroke-linejoin=&#34;round&#34;&gt;
    &lt;line x1=&#34;4&#34; y1=&#34;9&#34; x2=&#34;20&#34; y2=&#34;9&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;4&#34; y1=&#34;15&#34; x2=&#34;20&#34; y2=&#34;15&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;10&#34; y1=&#34;3&#34; x2=&#34;8&#34; y2=&#34;21&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;16&#34; y1=&#34;3&#34; x2=&#34;14&#34; y2=&#34;21&#34;&gt;&lt;/line&gt;
&lt;/svg&gt;

&lt;/a&gt;
&lt;/h2&gt;

&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Function&lt;/th&gt;
          &lt;th&gt;Description&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;code&gt;database()&lt;/code&gt;&lt;/td&gt;
          &lt;td&gt;Get the name of the working database&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;code&gt;user()&lt;/code&gt;&lt;/td&gt;
          &lt;td&gt;Get the name of the user operating on the working database&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;code&gt;version()&lt;/code&gt;&lt;/td&gt;
          &lt;td&gt;MySQL version&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;code&gt;concat()&lt;/code&gt;&lt;/td&gt;
          &lt;td&gt;Concatenate two or more strings per row&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;code&gt;group_concat()&lt;/code&gt;&lt;/td&gt;
          &lt;td&gt;Concatenate all the strings in one row&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;code&gt;substring(&#39;string&#39;/&amp;lt;column_name&amp;gt;,&amp;lt;offset&amp;gt;,&amp;lt;length&amp;gt;)&lt;/code&gt;&lt;/td&gt;
          &lt;td&gt;Get a part of the value of a string or column&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;code&gt;ord()&lt;/code&gt;&lt;/td&gt;
          &lt;td&gt;Convert the value to ordinal (decimal)&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;!-- end-chunk --&gt;
&lt;!-- begin-chunk data-anchor=&#34;number-of-columns&#34; --&gt;

&lt;h2 class=&#34;header-anchor-wrapper&#34;&gt;Number of Columns
  &lt;a href=&#34;#number-of-columns&#34; class=&#34;header-anchor-link&#34;&gt;
&lt;svg
    xmlns=&#34;http://www.w3.org/2000/svg&#34;
    width=&#34;1rem&#34; height=&#34;1rem&#34; viewBox=&#34;0 0 24 24&#34; fill=&#34;none&#34;
    stroke=&#34;currentColor&#34; stroke-width=&#34;2&#34; stroke-linecap=&#34;round&#34;
    stroke-linejoin=&#34;round&#34;&gt;
    &lt;line x1=&#34;4&#34; y1=&#34;9&#34; x2=&#34;20&#34; y2=&#34;9&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;4&#34; y1=&#34;15&#34; x2=&#34;20&#34; y2=&#34;15&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;10&#34; y1=&#34;3&#34; x2=&#34;8&#34; y2=&#34;21&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;16&#34; y1=&#34;3&#34; x2=&#34;14&#34; y2=&#34;21&#34;&gt;&lt;/line&gt;
&lt;/svg&gt;

&lt;/a&gt;
&lt;/h2&gt;

&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th&gt;Method&lt;/th&gt;
          &lt;th&gt;Description&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;code&gt;ORDER BY 3-- -&lt;/code&gt;&lt;/td&gt;
          &lt;td&gt;For numbers. If column index provided exceeds the number of column present in the table, there will be an error&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;code&gt;&#39; ORDER BY 3-- -&lt;/code&gt;&lt;/td&gt;
          &lt;td&gt;For string. If column index provided exceeds the number of column present in the table, there will be an error&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td&gt;&lt;code&gt; UNION SELECT 1,2,3-- -&lt;/code&gt;&lt;/td&gt;
          &lt;td&gt;For numbers. It will throw an error till right number of columns haven&amp;rsquo;t been &amp;ldquo;SELECT&amp;quot;ed&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;!-- end-chunk --&gt;
&lt;!-- begin-chunk data-anchor=&#34;database-contents&#34; --&gt;

&lt;h2 class=&#34;header-anchor-wrapper&#34;&gt;Database Contents
  &lt;a href=&#34;#database-contents&#34; class=&#34;header-anchor-link&#34;&gt;
&lt;svg
    xmlns=&#34;http://www.w3.org/2000/svg&#34;
    width=&#34;1rem&#34; height=&#34;1rem&#34; viewBox=&#34;0 0 24 24&#34; fill=&#34;none&#34;
    stroke=&#34;currentColor&#34; stroke-width=&#34;2&#34; stroke-linecap=&#34;round&#34;
    stroke-linejoin=&#34;round&#34;&gt;
    &lt;line x1=&#34;4&#34; y1=&#34;9&#34; x2=&#34;20&#34; y2=&#34;9&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;4&#34; y1=&#34;15&#34; x2=&#34;20&#34; y2=&#34;15&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;10&#34; y1=&#34;3&#34; x2=&#34;8&#34; y2=&#34;21&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;16&#34; y1=&#34;3&#34; x2=&#34;14&#34; y2=&#34;21&#34;&gt;&lt;/line&gt;
&lt;/svg&gt;

&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;em&gt;Works with UNION queries&lt;/em&gt;&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>SQL Injection 0x03 - Blind Boolean Attacks</title>
      <link>https://www.noobsec.net/sqli-0x03/</link>
      <pubDate>Sat, 18 Jul 2020 14:37:47 +0000</pubDate>
      
      <guid>https://www.noobsec.net/sqli-0x03/</guid>
      <description>&lt;!-- end-chunk --&gt;
&lt;!-- begin-chunk data-anchor=&#34;sql-injection-0x03---blind-boolean-attacks&#34; --&gt;

&lt;h1 class=&#34;header-anchor-wrapper&#34;&gt;SQL Injection 0x03 - Blind Boolean Attacks
  &lt;a href=&#34;#sql-injection-0x03---blind-boolean-attacks&#34; class=&#34;header-anchor-link&#34;&gt;
&lt;svg
    xmlns=&#34;http://www.w3.org/2000/svg&#34;
    width=&#34;1rem&#34; height=&#34;1rem&#34; viewBox=&#34;0 0 24 24&#34; fill=&#34;none&#34;
    stroke=&#34;currentColor&#34; stroke-width=&#34;2&#34; stroke-linecap=&#34;round&#34;
    stroke-linejoin=&#34;round&#34;&gt;
    &lt;line x1=&#34;4&#34; y1=&#34;9&#34; x2=&#34;20&#34; y2=&#34;9&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;4&#34; y1=&#34;15&#34; x2=&#34;20&#34; y2=&#34;15&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;10&#34; y1=&#34;3&#34; x2=&#34;8&#34; y2=&#34;21&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;16&#34; y1=&#34;3&#34; x2=&#34;14&#34; y2=&#34;21&#34;&gt;&lt;/line&gt;
&lt;/svg&gt;

&lt;/a&gt;
&lt;/h1&gt;

&lt;!-- end-chunk --&gt;
&lt;!-- begin-chunk data-anchor=&#34;introduction&#34; --&gt;

&lt;h2 class=&#34;header-anchor-wrapper&#34;&gt;Introduction
  &lt;a href=&#34;#introduction&#34; class=&#34;header-anchor-link&#34;&gt;
&lt;svg
    xmlns=&#34;http://www.w3.org/2000/svg&#34;
    width=&#34;1rem&#34; height=&#34;1rem&#34; viewBox=&#34;0 0 24 24&#34; fill=&#34;none&#34;
    stroke=&#34;currentColor&#34; stroke-width=&#34;2&#34; stroke-linecap=&#34;round&#34;
    stroke-linejoin=&#34;round&#34;&gt;
    &lt;line x1=&#34;4&#34; y1=&#34;9&#34; x2=&#34;20&#34; y2=&#34;9&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;4&#34; y1=&#34;15&#34; x2=&#34;20&#34; y2=&#34;15&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;10&#34; y1=&#34;3&#34; x2=&#34;8&#34; y2=&#34;21&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;16&#34; y1=&#34;3&#34; x2=&#34;14&#34; y2=&#34;21&#34;&gt;&lt;/line&gt;
&lt;/svg&gt;

&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Blind SQL injection are the type of SQL injections attacks wherein no database error is received from the web responses, there are either subtle or no changes to the web page upon sending injection payloads. Since these changes are either subtle or non-existent, it becomes harder to identify and exploit these vulnerabilities but are certainly not impossible.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>SQL Injection 0x02 - Testing and UNION Attacks</title>
      <link>https://www.noobsec.net/sqli-0x02/</link>
      <pubDate>Fri, 10 Jul 2020 22:31:47 +0000</pubDate>
      
      <guid>https://www.noobsec.net/sqli-0x02/</guid>
      <description>&lt;!-- end-chunk --&gt;
&lt;!-- begin-chunk data-anchor=&#34;sql-injection-0x02---testing-and-union-attacks&#34; --&gt;

&lt;h1 class=&#34;header-anchor-wrapper&#34;&gt;SQL Injection 0x02 - Testing and UNION Attacks
  &lt;a href=&#34;#sql-injection-0x02---testing-and-union-attacks&#34; class=&#34;header-anchor-link&#34;&gt;
&lt;svg
    xmlns=&#34;http://www.w3.org/2000/svg&#34;
    width=&#34;1rem&#34; height=&#34;1rem&#34; viewBox=&#34;0 0 24 24&#34; fill=&#34;none&#34;
    stroke=&#34;currentColor&#34; stroke-width=&#34;2&#34; stroke-linecap=&#34;round&#34;
    stroke-linejoin=&#34;round&#34;&gt;
    &lt;line x1=&#34;4&#34; y1=&#34;9&#34; x2=&#34;20&#34; y2=&#34;9&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;4&#34; y1=&#34;15&#34; x2=&#34;20&#34; y2=&#34;15&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;10&#34; y1=&#34;3&#34; x2=&#34;8&#34; y2=&#34;21&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;16&#34; y1=&#34;3&#34; x2=&#34;14&#34; y2=&#34;21&#34;&gt;&lt;/line&gt;
&lt;/svg&gt;

&lt;/a&gt;
&lt;/h1&gt;

&lt;!-- end-chunk --&gt;
&lt;!-- begin-chunk data-anchor=&#34;introduction&#34; --&gt;

&lt;h2 class=&#34;header-anchor-wrapper&#34;&gt;Introduction
  &lt;a href=&#34;#introduction&#34; class=&#34;header-anchor-link&#34;&gt;
&lt;svg
    xmlns=&#34;http://www.w3.org/2000/svg&#34;
    width=&#34;1rem&#34; height=&#34;1rem&#34; viewBox=&#34;0 0 24 24&#34; fill=&#34;none&#34;
    stroke=&#34;currentColor&#34; stroke-width=&#34;2&#34; stroke-linecap=&#34;round&#34;
    stroke-linejoin=&#34;round&#34;&gt;
    &lt;line x1=&#34;4&#34; y1=&#34;9&#34; x2=&#34;20&#34; y2=&#34;9&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;4&#34; y1=&#34;15&#34; x2=&#34;20&#34; y2=&#34;15&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;10&#34; y1=&#34;3&#34; x2=&#34;8&#34; y2=&#34;21&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;16&#34; y1=&#34;3&#34; x2=&#34;14&#34; y2=&#34;21&#34;&gt;&lt;/line&gt;
&lt;/svg&gt;

&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Hi, welcome to the second post of the sql injection series, if you haven&amp;rsquo;t read the first part of the series, you can read it &lt;a href=&#34;https://www.noobsec.net/sqli-0x01&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>SQL Injection - 0x01</title>
      <link>https://www.noobsec.net/sqli-0x01/</link>
      <pubDate>Fri, 03 Jul 2020 16:22:37 +0000</pubDate>
      
      <guid>https://www.noobsec.net/sqli-0x01/</guid>
      <description>&lt;!-- end-chunk --&gt;
&lt;!-- begin-chunk data-anchor=&#34;sql-injection-0x01&#34; --&gt;

&lt;h1 class=&#34;header-anchor-wrapper&#34;&gt;SQL Injection 0x01
  &lt;a href=&#34;#sql-injection-0x01&#34; class=&#34;header-anchor-link&#34;&gt;
&lt;svg
    xmlns=&#34;http://www.w3.org/2000/svg&#34;
    width=&#34;1rem&#34; height=&#34;1rem&#34; viewBox=&#34;0 0 24 24&#34; fill=&#34;none&#34;
    stroke=&#34;currentColor&#34; stroke-width=&#34;2&#34; stroke-linecap=&#34;round&#34;
    stroke-linejoin=&#34;round&#34;&gt;
    &lt;line x1=&#34;4&#34; y1=&#34;9&#34; x2=&#34;20&#34; y2=&#34;9&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;4&#34; y1=&#34;15&#34; x2=&#34;20&#34; y2=&#34;15&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;10&#34; y1=&#34;3&#34; x2=&#34;8&#34; y2=&#34;21&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;16&#34; y1=&#34;3&#34; x2=&#34;14&#34; y2=&#34;21&#34;&gt;&lt;/line&gt;
&lt;/svg&gt;

&lt;/a&gt;
&lt;/h1&gt;

&lt;!-- 💉 Injections are pretty cool aren&#39;t they? 💉 --&gt;
&lt;p&gt;Hi, welcome to the first post of the SQL injection series. Before we dive into the &amp;ldquo;injection&amp;rdquo; part of it, let&amp;rsquo;s first understand the basics of what SQL is and the usual structure of a database-driven system.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>File Inclusion</title>
      <link>https://www.noobsec.net/file-inclusion/</link>
      <pubDate>Mon, 29 Jun 2020 21:44:39 +0000</pubDate>
      
      <guid>https://www.noobsec.net/file-inclusion/</guid>
      <description>&lt;!-- end-chunk --&gt;
&lt;!-- begin-chunk data-anchor=&#34;file-inclusion&#34; --&gt;

&lt;h1 class=&#34;header-anchor-wrapper&#34;&gt;File Inclusion
  &lt;a href=&#34;#file-inclusion&#34; class=&#34;header-anchor-link&#34;&gt;
&lt;svg
    xmlns=&#34;http://www.w3.org/2000/svg&#34;
    width=&#34;1rem&#34; height=&#34;1rem&#34; viewBox=&#34;0 0 24 24&#34; fill=&#34;none&#34;
    stroke=&#34;currentColor&#34; stroke-width=&#34;2&#34; stroke-linecap=&#34;round&#34;
    stroke-linejoin=&#34;round&#34;&gt;
    &lt;line x1=&#34;4&#34; y1=&#34;9&#34; x2=&#34;20&#34; y2=&#34;9&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;4&#34; y1=&#34;15&#34; x2=&#34;20&#34; y2=&#34;15&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;10&#34; y1=&#34;3&#34; x2=&#34;8&#34; y2=&#34;21&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;16&#34; y1=&#34;3&#34; x2=&#34;14&#34; y2=&#34;21&#34;&gt;&lt;/line&gt;
&lt;/svg&gt;

&lt;/a&gt;
&lt;/h1&gt;

&lt;!-- end-chunk --&gt;
&lt;!-- begin-chunk data-anchor=&#34;introduction&#34; --&gt;

&lt;h2 class=&#34;header-anchor-wrapper&#34;&gt;Introduction
  &lt;a href=&#34;#introduction&#34; class=&#34;header-anchor-link&#34;&gt;
&lt;svg
    xmlns=&#34;http://www.w3.org/2000/svg&#34;
    width=&#34;1rem&#34; height=&#34;1rem&#34; viewBox=&#34;0 0 24 24&#34; fill=&#34;none&#34;
    stroke=&#34;currentColor&#34; stroke-width=&#34;2&#34; stroke-linecap=&#34;round&#34;
    stroke-linejoin=&#34;round&#34;&gt;
    &lt;line x1=&#34;4&#34; y1=&#34;9&#34; x2=&#34;20&#34; y2=&#34;9&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;4&#34; y1=&#34;15&#34; x2=&#34;20&#34; y2=&#34;15&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;10&#34; y1=&#34;3&#34; x2=&#34;8&#34; y2=&#34;21&#34;&gt;&lt;/line&gt;&lt;line x1=&#34;16&#34; y1=&#34;3&#34; x2=&#34;14&#34; y2=&#34;21&#34;&gt;&lt;/line&gt;
&lt;/svg&gt;

&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;File inclusion vulnerabilities are of two types: &lt;strong&gt;Remote File Inclusion (RFI)&lt;/strong&gt; and &lt;strong&gt;Local File Inclusion (LFI)&lt;/strong&gt;.
&lt;strong&gt;RFI&lt;/strong&gt; is said to be present when a web application allows remote users to load and execute a remote file on the server.
&lt;strong&gt;LFI&lt;/strong&gt; is said to be present when a web application allows remote users to load any pre-existing file and execute it on the server.&lt;/p&gt;</description>
    </item>
    
  </channel>
</rss>