File tree Expand file tree Collapse file tree 1 file changed +5
-0
lines changed
Expand file tree Collapse file tree 1 file changed +5
-0
lines changed Original file line number Diff line number Diff line change @@ -79,21 +79,25 @@ Lets try to change the approach.
7979
8080Lets try putting in some random input, my mind is getting a little idea of where it is going _ maybe_ .
8181![ Testing random input] (/assets/img/Pasted image 20250816003925.png)
82+
8283Its more of an Injection vulnerability I see
8384Its been a long I have not dealt with a SQLi, now quickly digging through my notes for revising required methods.
8485
8586From the responses below
8687![ SQL injection response] (/assets/img/Pasted image 20250816004841.png)
88+
8789I can imagine of a SQL query
8890` select pass from users where user='<input>' limit 30 `
8991
9092Now we'll try creating some SQL payloads based on the payloads I already have in my notes.
9193` 'union select 1' `
9294![ Union select blocked] (/assets/img/Pasted image 20250816005530.png)
95+
9396Okhayy!
9497They might be blocking some keywords most probably as an easy way out.
9598Here might be a logic error lets try ` 'UnIOn sElecT 1' `
9699![ Bypassing keyword filter] (/assets/img/Pasted image 20250816005739.png)
100+
97101as a developer I would also blacklist these keywords as its an easy fix(not a fix really). Laziness is a problem frr.
98102I love these kinda logic based errors!
99103
@@ -120,6 +124,7 @@ Enough to craft useful payloads.
120124
121125` 'Union Select username from admintable where id='1 `
122126![ Admin username] (/assets/img/Pasted image 20250816011619.png)
127+
123128If needed we could've dumped all but in this case we don't need the whole database.
124129
125130![ Question 1 answer] (/assets/img/Pasted image 20250816011809.png)
You can’t perform that action at this time.
0 commit comments