column-enumeration

1 article
sort: new top best
clear filter
0 6/10

A bug bounty hunter demonstrates a union-based SQL injection attack against a private company's web application, using order-by enumeration to identify 11 vulnerable columns, extracting database version, user, OS details, and dumping table schemas via information_schema queries with encoding bypasses.

Nur A Alam Dipu
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 4 hours ago · details