A practical guide to uncovering SQL injection flaws using automation, payloads and deep reconnaissance techniques.
SQL Injection remains one of the most critical web vulnerabilities, allowing attackers to manipulate backend databases through unsanitized inputs. Effective reconnaissance is key to identifying potential SQLi points before exploitation. This article walks you through a practical, step-by-step SQLi reconnaissance methodology using popular tools and payloads.
Before testing for SQLi you need to discover the attack surface the subdomains and URLs that might be vulnerable.
For a single domain use:
subfinder -d example.com -all -silent | httpx-toolkit -td -sc -silent | grep -Ei 'asp|php|jsp|jspx|aspx'
For multiple subdomains listed in a file (subdomains.txt):
subfinder -dL subdomains.txt -all -silent | httpx-toolkit -td -sc -silent | grep -Ei 'asp|php|jsp|jspx|aspx'