1. Error messages: Sometimes error messages can reveal important information about the application's database, such as table names or column names. An attacker can use this information to craft a SQL injection attack.
2. Search fields: Search fields are often overlooked when testing for SQL injection vulnerabilities, but they can be an easy target for attackers. In un-sanitized search queries, an attacker can inject SQL code to retrieve sensitive data from the database.
3. Cookies: Cookies can be used to store user information, and if the application uses cookies to retrieve data from the database, they could be vulnerable to SQL injection attacks.
4. HTTP headers: HTTP headers can also be manipulated to inject SQL code. For example, an attacker can inject SQL code into the "referer" header to gain access to sensitive information.
5. JSON and XML data: Applications that use JSON or XML data might be vulnerable to SQL injection attacks if the data is not properly validated or sanitized.
What are some other unpopular SQL injection areas according to you? 🤔
Share them in the comments below.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
1. Follow me @thebinarybot to get quality content on cybersecurity and bug bounty hunting. 2. RT the tweet below to share this thread with your audience
Worry no more. Open the thread below and master to core!
🧵👇
1. Pre-requisites
I still believe you can get into Cybersecurity without having little to no technical knowledge. That being said, if you want to master the art I would highly suggest you to learn these topics:
1. Networks 2. Operating Systems 3. Programming - Python/Bash/JS
2. Practice by doing
One of the best ways to learn is to learn by doing. Here's a list of freemium platforms where you can learn hands-on.