How I found Blind SQL Injection just by browsing and getting a unique URL

2 years ago 144
BOOK THIS SPACE FOR AD
ARTICLE AD

Jawad Mahdi

Hello Guys! I am a part-time bug hunter at Bugcrowd and I will share how I found a Blind SQL INJECTION manually just by browsing and checking http history in BURPSUITE.

So basically, I was Invited to a private program on Bugcrowd. That site was based on Laravel Framework and I thought they might be using MYSQL DATABASE. So I decided to test Blind SQL INJECTION on that site.

I manually browsed all the URLS and they were getting collected in BURPSUITE HTTP HISTORY. I found a unique POST request which weren’t normally available. So I suddenly remembered that sometimes manually browsing can get you unique URLS if you use a PROXY like Burpsuite, I read it in WEB APPLICATION HACKER HANDBOOK.

I found many parameters in that POST request and I started checking those parameters with this payload

‘XOR(if(now()=sysdate(),sleep(5*1),0))OR’

And to my surprise, It worked and slept for 5 seconds. I immediately copied the request and used SQLMAP on that.

I used different SQLMAP command but a firewall was blocking me for the fetching current database.

I then launched this command

sqlmap.py -r request.txt -p “value” -v 3 — level=5 — risk=3 — time-sec=15 — tamper=between — current-db — no-cast

and guess what?

I was able to retrieve the current database name.

Takeaways

Always check each and every request which you think might be querying with database and check SQL INJECTION there with manual testing and fuzzing and check those response carefully.

Thank you for reading!

Read Entire Article