Lab 9.2 – Exploiting Gloin - Snowboundport37/champlain GitHub Wiki

🔐 Lab 9.2 – Exploiting Gloin

Target: gloin.shire.org
Objective: Exploit vulnerabilities to gain unauthorized access, enumerate sensitive data, and understand mitigation strategies.


📌 Overview

This project focuses on exploiting a vulnerable web application using SQL Injection (SQLi) techniques against an SQLite back end. The goal was to bypass authentication, enumerate database tables, extract credentials, and explore potential privilege escalation paths.


🖥️ Target Information

  • Target IP: 10.0.5.31
  • Open Ports:
    • 80/tcp – HTTP (Web Application)
    • 443/tcp – HTTPS

Identified via:

nmap -sV 10.0.5.31

🕳️ Discovered Vulnerability

  • Type: SQL Injection (Authentication Bypass + Data Extraction)
  • Injection Point: