Difference between revisions of "DVWA: Exploit menggunakan sqlmap"

From OnnoWiki
Jump to navigation Jump to search
Line 17: Line 17:
  
  
  sqlmap.py -u “ http://192.168.0.100/DVWA-1.9/vulnerabilities/sqli/?id=1&Submit=Submit#"; \
+
  sqlmap -u “ http://192.168.0.100/DVWA-1.9/vulnerabilities/sqli/?id=1&Submit=Submit#"; \
 
  --cookie=”security=low; PHPSESSID=mgpoe8u061npgiv233q2ved227” -f
 
  --cookie=”security=low; PHPSESSID=mgpoe8u061npgiv233q2ved227” -f
  

Revision as of 09:36, 3 May 2017

Sumber: https://pentestlab.wordpress.com/2012/11/24/owning-the-database-with-sqlmap/


URL DVWA yang di serang

http://192.168.0.100/DVWA-1.9/vulnerabilities/sqli/?id=1&Submit=Submit#

Then we need to specify the cookie.We use this option in cases where the web application requires authentication like DVWA.So we will take the cookie that the application issued to us and we will put it on the sqlmap as well.We can capture the cookie by using any web application proxy like Burp.We will also put the –dbs parameter which will discover the databases that are running:

Starting the SQL Injection tests


Now lets see what was the result of these tests:

Enumerating databases


sqlmap -u “ http://192.168.0.100/DVWA-1.9/vulnerabilities/sqli/?id=1&Submit=Submit#"; \
--cookie=”security=low; PHPSESSID=mgpoe8u061npgiv233q2ved227” -f

Fingerprinting the database


Knowing the exact version of the database will allow us to search for any common vulnerabilities that are might affect the database.The version of the database can be retrieved also and from the banner with the parameter -b.

Retrieving the database banner


So we will give the sqlmap the necessary parameters in order to discover the following:

   The current user
   The hostname
   If the current user is dba
   The current database

Command:

./sqlmap.py -u “http://172.16.212.133/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit#” –cookie=”PHPSESSID=46c8d37dccf4de6bf8977516f4dc66e0; security=low” –current-user –is-dba –current-db –hostname

Obtaining the current user,current db,hostname and if the current user is dba


As we can see from the image above we have obtained successfully the information that we asked.Now we need to find the users and their password hashes as well as and their privileges and roles that they have on the database.This is very important because we can use this kind of information to access the database directly in case that we can crack the hashes.SQLMap provides this functionality as well but in our case SQLMap discovered that for the accounts root,guest and debian-sys-maint no password has set and the root account has administrative privileges.

Command:

./sqlmap.py -u “http://172.16.212.133/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit#” –cookie=”PHPSESSID=46c8d37dccf4de6bf8977516f4dc66e0; security=low” –users –passwords –privileges –roles

Discover database users and hashes


Discover Privileges and Roles


At this point we can say that the database is ours as we have all the database accounts in our disposal and the knowledge that these accounts are running with DBA privileges.However we would like also to own and the application so now we will focus on that.In order to achieve this we will need to extract data from the dvwa database.The sqlmap with the –tables parameter can enumerate the tables of all the databases that exist.

./sqlmap.py -u “http://172.16.212.133/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit#” –cookie=”PHPSESSID=46c8d37dccf4de6bf8977516f4dc66e0; security=low” –tables

Database tables


The dvwa database as we can see from the above output has only two tables:the guestbook and the users.We will try to enumerate the columns of these tables with the parameter –columns in the sqlmap.

Command:

./sqlmap.py -u “http://172.16.212.133/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit#” –cookie=”PHPSESSID=46c8d37dccf4de6bf8977516f4dc66e0; security=low” –columns

Obtaining the columns


The interesting table is the users because as we can see from the screenshot it has a column with the name password which may contain password hashes or even better passwords in clear text format.So lets see what kind of data the columns of these two tables are containing.

Command:

./sqlmap.py -u “http://172.16.212.133/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit#” –cookie=”PHPSESSID=46c8d37dccf4de6bf8977516f4dc66e0; security=low” –dump

Guestbook – Tables Entries


Cracking hashes in table users


As we can see from the image above sqlmap discovered password hashes on the column password and cracked them successfully by using a dictionary attack.Now we have and the passwords along with the usernames of the DVWA users which means that the database and the application have been compromised completely.

Conclusion

In this tutorial we saw how effective is the sqlmap tool when we have to identify and exploit SQL injection vulnerabilities.Of course the proper way to exploit the SQL Injection vulnerability is manually.However in many penetration tests due to time constraints the use of sqlmap is necessary.

Specifically in this case sqlmap managed to enumerate the database successfully and to extract data from the database tables very fast.Of course it has many more capabilities like that it can check for the existence of WAF (Web Application Firewall),IDS and IPS as well as that it can execute operating systems commands.For all these reasons this tool must be in the toolkit of every penetration tester.


Referensi