OWASP A03:2021 - Injection
Overview
Types of Injection Vulnerabilities
1. SQL Injection (SQLi)
2. NoSQL Injection
3. Command Injection (OS Command Injection)
4. LDAP Injection
5. XPath Injection
6. Template Injection (SSTI)
SQL Injection Testing Methodology
1. Detection Phase
2. Union-Based SQL Injection
3. Boolean-Based Blind SQL Injection
4. Time-Based Blind SQL Injection
5. Error-Based SQL Injection
NoSQL Injection Testing
MongoDB Injection
Command Injection Testing
Detection and Exploitation
Advanced Command Injection
LDAP Injection Testing
Authentication Bypass
Data Extraction
Server-Side Template Injection (SSTI)
Detection and Exploitation
Tools and Automation
SQLMap Usage
Custom Injection Testing Tools
Advanced Exploitation Techniques
SQL Injection Data Exfiltration
WAF Bypass Techniques
Prevention and Mitigation
1. Parameterized Queries/Prepared Statements
2. Input Validation and Sanitization
3. Template Security
Testing Checklist
SQL Injection Testing
Command Injection Testing
Other Injection Types
Reporting Template
Finding: [Injection Type] - [Specific Vulnerability]
Last updated