All topics ›
Ethical Hacking ›
Web App
Web App · Ethical Hacking Find SQL injection in a parameter that's not obvious. How?
Beyond basic ' or 1=1 -- testing: (1) Test in HTTP headers (User-Agent, Referer, X-Forwarded-For); (2) Test cookies — many apps blindly trust cookies; (3) Test JSON parameters in API endpoints (sqlmap supports JSON body via -r); (4) Test boolean-based — change parameter value, observe page diff (true vs false response patterns); (5) Time-based — IF(condition, SLEEP(5), 0) and observe response time; (6) Out-of-band — DNSlog.cn callbacks for blind SQLi where no direct response exists. Tool: sqlmap with --level=5 --risk=3 --tamper for advanced detection.
Want the full explanation? This is the atomic answer suitable for
quick interview prep. For the structured deep-dive — including code samples,
strong-answer vs weak-answer notes, common follow-up questions, and how this fits
the larger ethical hacking topic — see the full Q&A on Networkers Home:
→ Ethical Hacking Interview Hub — Full Q&A with deep context
→ Ethical Hacking Interview Hub — Full Q&A with deep context
How Networkers Home prepares students for this kind of question
This question reflects real interview rounds at Bangalore's top product, BFSI, and GCC cybersecurity teams. Networkers Home's flagship courses include mock interview sessions drilling exactly these question patterns, with feedback from interviewers who have hired for the role.
→ View the complete ethical hacking interview prep hub
→ View the related Networkers Home course
→ Book a free career consultation
Related Web App questions
Web App
Q. Explain SSRF and how to escalate to RCE.
SSRF (Server-Side Request Forgery) — server-side code fetches a URL the attacker controls. Detection: parameter accepts URL (e.g., 'image_url=', 'callback='), modify to internal IP (127.0.0.1, 169.254.169.254 cloud metad…
Read full answer → Web App
Q. Explain prototype pollution and give a real exploitation chain.
Prototype pollution — attacker modifies Object.prototype in JavaScript, affecting all subsequent object creations. JS-specific. Detection: parameters like __proto__, constructor.prototype in request body. Real chain: (1)…
Read full answer →