injection

Compare original and translation side by side

🇺🇸

Original

English
🇨🇳

Translation

Chinese

Injection

注入

Test for injection vulnerabilities across all input vectors. Covers SQL, NoSQL, Command, SSTI, XXE, and LDAP injection.
针对所有输入向量测试注入漏洞。涵盖SQL、NoSQL、命令、SSTI、XXE和LDAP注入。

Techniques

技术手段

TypeKey Vectors
SQL InjectionIn-band (union, error), Blind (boolean, time), Out-of-band
NoSQL InjectionOperator injection, JavaScript injection, aggregation pipeline
Command InjectionOS command separators, blind techniques, out-of-band
SSTITemplate engine detection, sandbox escape, RCE chains
XXEEntity expansion, SSRF via XXE, blind XXE, parameter entities
LDAP/XPathFilter manipulation, authentication bypass
类型关键向量
SQL注入带内(联合查询、报错)、盲注(布尔型、时间型)、带外
NoSQL注入操作符注入、JavaScript注入、聚合管道注入
命令注入操作系统命令分隔符、盲注技术、带外
SSTI模板引擎检测、沙箱逃逸、RCE链
XXE实体扩展、通过XXE实现SSRF、盲注XXE、参数实体
LDAP/XPath过滤器篡改、身份认证绕过

Workflow

工作流程

  1. Identify injection points (parameters, headers, cookies, JSON fields)
  2. Detect injection type with minimal probes
  3. Exploit with context-appropriate payloads
  4. Escalate (data extraction, RCE, file read)
  5. Capture evidence and write PoC
  1. 识别注入点(参数、请求头、Cookie、JSON字段)
  2. 通过最小化探测检测注入类型
  3. 使用符合上下文的载荷进行利用
  4. 提权(数据提取、RCE、文件读取)
  5. 捕获证据并编写PoC

Reference

参考资料

  • reference/sql-injection*.md
    - SQL injection techniques
  • reference/nosql-injection*.md
    - NoSQL injection techniques
  • reference/os-command-injection*.md
    - OS command injection
  • reference/ssti*.md
    - Server-side template injection
  • reference/xxe*.md
    - XML external entity injection
  • reference/sql-injection*.md
    - SQL注入技术文档
  • reference/nosql-injection*.md
    - NoSQL注入技术文档
  • reference/os-command-injection*.md
    - 操作系统命令注入文档
  • reference/ssti*.md
    - 服务器端模板注入文档
  • reference/xxe*.md
    - XML外部实体注入文档