Mastering SQL Injection Recon: Step-by-Step Guide for Bug Bounty Hunters
文章介绍了一种利用自动化工具和技术进行SQL注入漏洞侦察的方法,通过subfinder和httpx-toolkit等工具枚举子域并识别潜在易受攻击的URL,帮助安全人员系统性地发现SQL注入风险点。 2025-5-20 04:46:12 Author: infosecwriteups.com(查看原文) 阅读量:8 收藏

A practical guide to uncovering SQL injection flaws using automation, payloads and deep reconnaissance techniques.

coffinxp

SQL Injection remains one of the most critical web vulnerabilities, allowing attackers to manipulate backend databases through unsanitized inputs. Effective reconnaissance is key to identifying potential SQLi points before exploitation. This article walks you through a practical, step-by-step SQLi reconnaissance methodology using popular tools and payloads.

Before testing for SQLi you need to discover the attack surface the subdomains and URLs that might be vulnerable.

For a single domain use:

subfinder -d example.com -all -silent | httpx-toolkit -td -sc -silent | grep -Ei 'asp|php|jsp|jspx|aspx'

For multiple subdomains listed in a file (subdomains.txt):

subfinder -dL subdomains.txt -all -silent | httpx-toolkit -td -sc -silent | grep -Ei 'asp|php|jsp|jspx|aspx'

文章来源: https://infosecwriteups.com/mastering-sql-injection-recon-step-by-step-guide-for-bug-bounty-hunters-9f493fb058dd?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh