SQL Injection
SQL Injection
ASSESSEMENT
BY RAJA SHEKAR REDDY
STEP 1 :
Find the vulnerable website from the Google(Internet).
STEP 2:
Try to make a tunnel/communication with the website. By changing the value of Id we can
establish
book_details.php?id=601
STEP 4:
Then run the command in the terminal
STEP 5:
Wait until it loads, in between it ask for Yes/No con rmation. Just con rm Yes by pressing Y.
The above command show results for available databases for the website.
# hmphoto
# information schema
fl
fi
fl
fi
STEP 6:
Run the command
Sqlmap -h
Which gives available options in sqlmap
STEP 7:
Now I am going fetch all the tables in the database
STEP 8:
The above command fetches all the tables in the database.
STEP 9:
Now I am going to nd the passwords in the database.
fi
Proof of con rmation: