SQLMap Hashing
SQLMap Hashing
Objective:
1. Log in to backtrack
2. Please do ping to check the internet connectivity.
3. Click on Applications > Backtrack > Vulnerability Assessment > Web Application Assessment
> Web Vulnerability Scanners > sqlmap.
4. Open google to find vulnerable website. Type php?id=1 on the search box. To be easier, it is
better to try website co.id, so type co.id php?id=1
In this class activity, we will use gree.co.id.
5. Click one of them and to check vulnerability type ‘ at the end of url.
http://gree.co.id/profile.php?id=1’
6. If the website shows the error message, it means that the website has vulnerability.
Getting the database (focus on user name and password) using sqlmap
8. If stop at
[13:50:26] [INFO] GET parameter 'id' is 'MySQL UNION query (NULL) - 1 to 20 columns' injectable
GET parameter 'id' is vulnerable. Do you want to keep testing the others (if any)? [y/N] N
17. We find that user name: admin and password: b1dbcc58230e213bbbfcc108a7b4fb68 (hashing).
18. Click on Applications > BackTrack > Privilege Escalation > Password Attacks > Online Attacks
> findmyhash