Learn to Hack
search
⌘Ctrlk
Learn to Hack
  • Introduction
    • 💀whoami
    • Writeups
  • Where to Start?
    • Learn to hack
    • Web Basics
    • HTTP Basics
    • Networking Basics
    • Linux Basics
    • Programming Basics
    • Hacking and its types
    • Phases of hacking
    • Bug Bounty
  • Learn Hacking
    • Platforms to learn hacking
    • Courses for hacking and cybersecurity
    • Youtube Channels CyberSecurity
    • Bug Bounty Writeups
    • Security Books
    • Security Blogs
    • Security News
  • Practice Hacking
    • Practice hacking skills
  • Security Bugs
    • GQL GraphQL
    • Exploit Payment Gateways
    • Unrestricted File Upload
    • XSS Cross Site Scripting
    • CSRF Cross Site Request Forgery
    • SSRF Server Side Request Forgery
    • BAC Broken Access Control
    • BOLA Broken Object Level Authorization
    • SQLi SQL Injection
      • Real world report PoCs
    • RCE Remote Code Execution
    • IDOR Insecure Direct Object Reference
  • Security Tools
    • Recon
    • Exploitation
    • Setup Burp Collaborator Server
    • Miscellaneous
  • Security Verification Standards
    • ASVS Application Security Verification Standard
    • MASVS Mobile Application Security Verification Standard
  • Security Testing Guides
    • Rest API Security Checklist
    • Web Application Testing Techniques
    • Web Security Testing Guide
    • Mobile Security Testing Guide
  • Security findings
    • Security Articles
  • Special Thanks
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Security Bugschevron-right
  2. SQLi SQL Injection

Real world report PoCs

You can read these real world SQLi PoCs to better understand how the bug is exploited in the real world scenarios

  • SQL Injection Vulnerability nutanixarrow-up-right by Muhammad Khizer Javed

  • Yahoo – Root Access SQL Injection – tw.yahoo.comarrow-up-right by Brett Buerhaus

  • Multiple vulnerabilities in a WordPress plugin at drive.uber.comarrow-up-right by Abood Nour (syndr0me)

  • GitHub Enterprise SQL Injectionarrow-up-right by Orange

  • SQL injection in WordPress Plugin Huge IT Video Gallery in Uberarrow-up-right by glc

  • SQL Injection on sctrack.email.uber.com.cnarrow-up-right by Orange Tsai

Reference: https://whoami.securitybreached.org/2019/06/03/guide-getting-started-in-bug-bounty-hunting/arrow-up-right

PreviousSQLi SQL Injectionchevron-leftNextRCE Remote Code Executionchevron-right

Last updated 4 years ago