BOOK THIS SPACE FOR AD
ARTICLE ADiCSI@NEISD Security Operations Center Classroom (San Antonio, Texas)
Downloadable VM and Walkthrough Linked at the bottom of this writeup.
Lab Summary:
While the internet is flooded with automated Proof of Concept (PoC) code for exploiting this particular vulnerability, there isn’t a whole lot that explains how SQLMap is able to exfiltrate the data that is does. Focused on the recent CVE-2023–6063 vulnerability in the WordPress plugin WP Fastest Cache, you’ll find no shortage of automated scripts online. However, most leave out the crucial “why” and “how” behind the process
Lab Objective: (2 Parts)
In the first part of this lab we exploit the Blind SQL condition in the WordpPress wp-fastest-cache plugin (ver 1.2.2) using SQLMapIn the second part of the lab we examine the underlying mechanics of Blind SQL injection and write a manual exploit.VM with Walkthrough Here: