⁉️Techniques to Force Errors from Databases for SQL Injection
Below are some advanced and rare SQL injection techniques for MSSQL, MySQL, and Oracle. These techniques go beyond the basic ones and exploit specific features and configurations of the databases.
MSSQL
OLE Automation Procedures
This uses OLE Automation procedures to execute system commands.
XP_CMD Shell with Privilege Escalation
This enables
xp_cmdshell
to execute system commands if it's not already enabled.Linked Servers
This technique uses linked servers to run commands on a different server.
MySQL
UDF (User Defined Functions) for Remote Command Execution
This technique involves creating a UDF to execute system commands.
DNS Exfiltration
This exfiltrates data through DNS requests to an attacker-controlled domain.
Binary Log Injections
This exploits the binary log feature to write a web shell.
Oracle
Java Procedures for Command Execution
This uses Java stored procedures to execute system commands.
UTL_FILE Package for File Access
This technique uses the
UTL_FILE
package to write files to the server.DBMS_SCHEDULER for Job Execution
This uses
DBMS_SCHEDULER
to execute jobs that can change database permissions.
Last updated