SQL Injection - Determining Oracle Database Version

preview_player
Показать описание
In this lab we'll run an SQL injection UNION attack to determine the version of the oracle database that is running on the backend.

This content is provided free of charge. Buy me a coffee though!
Please like and subscribe, it means a lot!

00:00 Introduction
01:18 Exploring the Lab
02:22 Proof of SQL Injection Vulnerability
03:22 Retrieving Oracle Version
Рекомендации по теме
Комментарии
Автор

I have a question. Why is your category sql injection querynot seperated by +? For example the answer provided is: '+UNION+SELECT+'abc'... etc. Notice I also could not get the query not seperated by '+' to work. However it seems like the +'s are just spaces encoded by base64 as you can tell from the other category strings provided by the site. Thanks.

tirckyspeed
Автор

1) is there any way in which we can combine multiple row result in one row ?? 2) how to get all database name or schema name in oracle ??

MidnightSpecter