About 936,000 results
Open links in new tab
  1. security - How does the SQL injection from the "Bobby Tables" …

    Dec 2, 2008 · The SQL injection here is the result of the name of the student terminating the statement and including a separate DROP TABLE command; the two dashes at the end of the …

  2. Bobby Tables and SQL Injection: What You Need to Know - Red9

    Oct 29, 2025 · Bobby drop tables, and how is SQL injection done? The example below is an old and popular comic about SQL Injection, a simple way to understand the concept, from …

  3. SQL Injection: Drop All Tables - Information Security Stack …

    You can exploit these systems using sub-select, union-selects, blind sql injection, into outfile, or loadfile(). SQLMap and Havij are both tools that automate the exploitation of SQL Injection.

  4. 327: Exploits of a Mom - explain xkcd

    Dec 15, 2025 · On another note, the explanation seems to indicate that Bobby is responsible for the SQL injection and later suggests instead the mother is responsible. My interpretation was …

  5. SQL Injection Cheat Sheet - Invicti

    Oct 20, 2015 · The cheat sheet includes technical information and payloads for SQL injection attacks against MySQL, Microsoft SQL Server, Oracle and PostgreSQL database servers.

  6. SQL Injection Lesson - Execute Program

    Drop the students table by executing a "Bobby Tables" SQL injection attack, as made famous by XKCD. (If you get stuck, try using a text editor to manually combine your attack string with the …

  7. SQL Injection - W3Schools

    A batch of SQL statements is a group of two or more SQL statements, separated by semicolons. The SQL statement below will return all rows from the "Users" table, then delete the …

  8. bobby-tables.com: A guide to preventing SQL injection

    Fork the bobby-tables repository at github, make your changes, and send me a pull request. Add an issue in the issue tracker. Explain why creating code from outside data is bad. Potential …

  9. Understanding SQL Injection with Select, Insert, Delete, and

    Aug 12, 2024 · Data deletion — attackers can delete database records or drop entire tables. In this article we will be discussing about finding the SQL injection through different SQL …

  10. darkScript () - IT & InfoSec Tutorials: Drop Tables, Not Bombs - SQL ...

    💻 Introduction to Injection Attacks 💻 In this beginner-friendly tutorial, we break down the concept of injection attacks and how they work - perfect for those starting out in cyber security.