Sunday, December 17, 2017
Home / Media / Using Burp to exploit a Blind SQL Injection

Using Burp to exploit a Blind SQL Injection

Caption of Video:

Many times I find myself having to write my own tool in order to exploit a Blind SQL injection which public tools normally would not be able to exploit. It may be because it is behind a WAF/IDS, or for a SQL challenge, or because it is Base64 encoded or some other peculiar situation where normal SQLi attack tools just will not work.

What I will demonstrate in this post is a way of taking a shortcut and avoiding having to create your own program by using Burp Suite which will hopefully save you valuable time. I highly recommend Burp for anyone that is serious about pen-testing. It is very affordable and has a great ton a features which makes auditing a breeze (the easter egg is hilarious too).

Once a target has been set in the scope and a SQL Injection has been located, we send the URL to Burp’s Intruder.

Next step is to define the SQL Injection and the position where the character to be brute-forced will be. For this example, I will be extracting the database().

After setting the position, we need to define the payload. We select numbers as our payload and define a range from 32 to 126. If you look at the Ascii table, this range accounts for all the characters that we need.

The last step before launching the attack is to set a string to be matched when the query returns true, just like you would with any other SQLi tool. In this case, the string to be matched will be ‘lightos’.

Now we can go to the menu under Intruder and select Start Attack. This will open a window that will display the results from each request. When we find a string match, it will clearly be displayed and we will know that is the correct character.

The first character found is decimal 84, which on the Ascii table is a T. This is the first letter of the database() value which is Test.

About FastFlux

Owner of ZeroSecurity, interested in programming, malware analysis and penetration testing. If you would like to write for the ZeroSecurity team, please use the contact form above.

Check Also

How to Frankenscript

Features Spoof/fake the mac address for both the WiFi adapter and virtual interface monX. Frankenscript …