SQL Dumper

SQL Dumper

SQL Dumper, A software tool that allows people who work with SQL greater control, comfort, and ease of use

This software is a great technological tool for any programmer or someone who does extensive computing work with SQL. Allows you to dump excess and selected tables from the SQL database and export them to SQL Insert statements. It is highly rated as well as highly recommended. Some key features are identified below:


  • You can choose where you want the Sqldumper.exe utility to transfer the file. However, this file must be previously created before the transfer. This allows for easier organization and use.
  • It moves a large amount of information. It is imperative to ensure that your hard drive has adequate storage space before you start using it, otherwise the process will fail. However, if you make sure there is adequate space, this software can make exporting your bulk data much easier and faster.
  • The program allows you to transfer each SQL table to its own file, or it will allow you to combine them all into one file. In addition, the 2nd version allows you to dump SQL queries and has incredible improvements in the interface that allow even more control.
  • The program contains certain special features that allow the user greater control and flexibility. For example, the Foreign Keys function allows the user to set a specific order for the tables in the text file, that way future information can be inserted avoiding collisions and errors. Another special feature is the Primary Key Identity function. This guarantees the value of the identity field.

This product is a must for anyone who works with SQL in large numbers. It will make every process much more efficient and effective. Although somewhat expensive, it will actually save your organization money in the long run by freeing up many hours of work, as well as allowing for better decision-making. Personally, I would definitely recommend this product.

SQL Injection Elimination Checklist

Possible SQLs:

  • Compliance with the WHERE condition to the true result for any parameter values.
  • Combining queries through the UNION operator.
  • Commenting on part of the request.

In order to detect SQL injections, a tester needs to understand the functional requirements, triggers, business logic, the main scenario of a web application, etc.

How to detect SQL injections

The article is informational. Don't break the law.

Manual search

Step 1

We substitute special characters (quotes, double quotes, etc.) in all parameters. First of all, parameters that accept user input as arguments are checked. If the server returned an error during transmission, then there is a suspicion of an injection. When the web application did not respond to special characters, there are 2 possible reasons:

  • There is no SQL injection.
  • Disabled error output on the web server.






Step 2

If an injection is detected, then we use the UNION-Based method, which is applied if an SQL injection occurs in a query using a SELECT statement. With this method, you can combine two queries into one result set. Its peculiarity lies in the fact that it will only work if the number of columns returned by the first query is equal to the number returned in the second query. To determine the number of columns, you can use 3 methods:

  1. Adding a column on every validation iteration. This is not very convenient, since there can be an infinite number of them.


    ?id=1' union select null --
    ?id=1' union select null,null --
    ?id=1' union select null,null,null --


    Finding the number of columns

    In this case, we use NULL because the data in each column must be consistent between the original and embedded queries. Because NULL can be converted to all commonly used data types, using it increases the chance of a successful payload with proper column counts.

  2. Using the ORDER BY clause to determine the number of columns. In this case, you need to rely on the appearance of an error about a mismatch in the number of columns in the query. It is worth starting with a large number of columns and halving them with each iteration of the test. If the quantity does not match the actual value, then an error will be returned:
    ?id=1' order by 20 --
    ?id=1' order by 10 --
    ?id=1' order by 5 --


    Checking with an order by
  3. The use of the GROUP BY clause, which is based on the reverse method of checking, as opposed to ORDER BY.


    ?id=1' group by 5 --
    ?id=1' group by 10 --
    ?id=1' group by 20 -- 


Now that we know how many columns the current table has, we use UNION SELECT to see which column is vulnerable. The vulnerable column will be the one whose data is displayed on the page.

Rate this post

Leave a Reply