information-schema

4 articles
sort: new top best
clear filter
0 7/10

Technical writeup demonstrating SQL injection bypass of ModSecurity WAF using MySQL comment encoding (/*!50000*/) and alternative payload construction with MOD/DIV operators and variable assignment to extract WordPress database credentials and schema information.

_Y000_
infosecwriteups.com · kh4sh3i/bug-bounty-writeups · 17 hours ago · details
0 8/10

A detailed writeup on converting a blind error-based MSSQL injection vulnerability into an exploitable boolean-based injection using the IIF() and CONVERT() functions to systematically enumerate database names and table metadata. The author demonstrates bypassing restrictions on verbose error messages and character limits through clever payload construction and Burp Intruder automation.

Ozgur Alp Synack Microsoft SQL Server IIS Burp Intruder SQLMap SQLFiddle
ozguralp.medium.com · kh4sh3i/bug-bounty-writeups · 17 hours ago · details
0 8/10

Detailed walkthrough of exploiting blind SQL injection in Oculus' developer portal by bypassing multiple filters (no whitespace, no commas) using comment syntax and MySQL alternative function syntax, ultimately extracting admin session tokens and gaining administrative access.

Oculus Facebook Josip Franjković Jon (Bitquark) developer.oculusvr.com CompanyAction.php PHPSESSID MySQL
josipfranjkovic.blogspot.com · devanshbatham/Awesome-Bugbounty-Writeups · 17 hours ago · details
0 6/10

A bug bounty hunter discovered a union-based SQL injection vulnerability in a private company's web application by identifying vulnerable parameters and methodically determining the number of columns (11) before extracting database version, user information, table schemas, and column names using UNION SELECT queries and information_schema enumeration.

Nur A Alam Dipu
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 17 hours ago · details