MANUAL SQL INJECTION
How to perform SQLI On a live site
SQL injection is a technique where a malicious user can inject SQL Commands into an SQL statement via a web page.
An attacker could bypass authentication, access, modify and delete data within a database. In some cases, SQL Injection can even be used to execute commands on the operating system, potentially allowing an attacker to escalate to more damaging attacks inside of a network that sits behind a firewall.
In the given screenshot we can see we have got an error message which means the running site is infected by SQL injection.
Similarly repeating for order 2, 3 and so on one by one.
From the screenshot, we can see we have got an error at the order by 4 which means it consists only three records.
From the screenshot, we can see it is show result for only one table not for others.
Hence we can see now it is showing the result for the remaining two tables also.
From the screenshot, we can read the database name "acuart"
Here we have retrieve "5.1.73 0ubuntu0 10.04.1" as version and "acuart@localhost" as the current user
From the screenshot we can read the name of the first table is artists.
From the screenshot we can read the name of the second table is "carts".
We got table 3: "categ"
We got table 4:"featured"
We got table 7: "users"
Since we didn’t get anything when the limit is set 8, 1 hence there might be 8 tables only inside the database.
From screen we can see through concat function we have successfully retrieved all table name inside the database.
We successfully retrieve all eight column names from inside the table users.
From the screenshot, we can read "uname: test"
From the screenshot, we can read "pass: test"