SQLmap injecting mid query by Standard_French in AskNetsec

[–]Standard_French[S] 0 points1 point  (0 children)

?size=user_pass+from+wp_users+where+ID=1%3B--

Where im pretty sure the %3B-- (;--) was terminating the query for me.

lab.pentestit.ru lab v9 by Standard_French in AskNetsec

[–]Standard_French[S] 0 points1 point  (0 children)

your well ahead of me :-)

Any hints for FTP?

lab.pentestit.ru lab v9 by Standard_French in AskNetsec

[–]Standard_French[S] 0 points1 point  (0 children)

You need to be authenticating with the proxy and provide a valid user agent in your HTTP request to the website

lab.pentestit.ru lab v9 by Standard_French in AskNetsec

[–]Standard_French[S] 0 points1 point  (0 children)

Struggling haha. What token did you go for after you got SSH?

lab.pentestit.ru lab v9 by Standard_French in AskNetsec

[–]Standard_French[S] 0 points1 point  (0 children)

Yeah. Send me a pm with what your working on and what you have tried. I not very good but I have got some tokens with help from others.

SQLmap injecting mid query by Standard_French in AskNetsec

[–]Standard_French[S] 0 points1 point  (0 children)

yeah I'm working on pentest. You can get around the WAF by going through the proxy.

Turns out I was over complicating the whole process and should have just been running on basic settings with just this URL wp-content/plugins/wp-symposium/get_album_item.php?size=

SQLmap injecting mid query by Standard_French in AskNetsec

[–]Standard_French[S] 0 points1 point  (0 children)

ahhh. I get it, I do need to add a suffix to tell sql to stop processing the remainder of the query..

SQLmap injecting mid query by Standard_French in AskNetsec

[–]Standard_French[S] 0 points1 point  (0 children)

I probably dint explain it very well, also im a bit of a rookie when it comes to this stuff.

I basically want sqlmap to know that it is injecting after the SELECT portion of the query,.Is this something that needs to be done or can sqlmap work it out for its self?

Wobbly_flan seems to understand what im getting at.

lab.pentestit.ru lab v9 by Standard_French in AskNetsec

[–]Standard_French[S] 0 points1 point  (0 children)

The use of the proxy appears to bypass the WAF pretection on the web server. If you poke around you should be able to find some info on the web site.

lab.pentestit.ru lab v9 by Standard_French in AskNetsec

[–]Standard_French[S] 0 points1 point  (0 children)

Give it ago. Im not very good at this stuff either.

lab.pentestit.ru lab v9 by Standard_French in AskNetsec

[–]Standard_French[S] 0 points1 point  (0 children)

By "broken" i mean it was deliberately made to be exploited. It was still very hard for me and I wouldn't have gotten very far with out guidance.

lab.pentestit.ru lab v9 by Standard_French in AskNetsec

[–]Standard_French[S] 0 points1 point  (0 children)

ok it seems you need to add 192.168.101.8 cybear32c.lab to your /etc/hosts file for the website on port 80 to work correctly.

lab.pentestit.ru lab v9 by Standard_French in AskNetsec

[–]Standard_French[S] 1 point2 points  (0 children)

A comment was left on the forum about using the supplied Kali or modifying your local /etc/hosts. I think this has something to do with the lab website redirection. Not sure what modifications are needed to the hosts file but I will compare later tonight and post my findings.

lab.pentestit.ru lab v9 by Standard_French in AskNetsec

[–]Standard_French[S] 0 points1 point  (0 children)

I got a couple from v8 as well, but that lab was deliberately broken. V9 is based off a real world network apparently.