Posts

Showing posts from November, 2024

OSCP Capstone Lab Writeup - SQLi Module - Save Animals

Image
Take a look  With anticipation, I opened the website, which only had index.php, about.php, and donate.php pages. Frustration set in as I couldn't find any input fields to interact with.  AutoRecon Scan(can be ignored) Then I tried to do autorecon to see if we have more hidden files or vulns. only get dbconn.php, but it was a blank page. Source Code Checking  Determined, I delved into the source code and searched for 'post'. My excitement grew when I discovered that 'mail-list' was a parameter in a subscribe form. Burpsuite intercept I quickly opened Burp Suite, set up the proxy, and intercepted the subscribe form.   SQL Injection With precision, I copied the intercepted data and saved it as post.txt.

OSCP Capstone Lab Writeup - SQLi Module - Alvida-Eatery

Image
  Take a look Website Content Analysis: Accessed the website (http://192.168.139.47:80)   Website Content Analysis: Displays bakery goods and coffee products Static content only No interactive elements found: No search functionality No login forms No input fields Initial Assessment: Limited attack surface due to lack of user input fields Traditional injection techniques not immediately applicable Need to explore alternative entry points Further Website Exploration:  Located and clicked on alvida-eatery.org link within the main website http://www6.alvida-eatery.org/lander?template=ARROW_3&tdfs=0&s_token=1731789108.0467710000&uuid=1731789108.0467710000&term=Caterer%20Menu&term=Lunch%20Catering&term=Restaurant%20Table%20Reservations%20Online&searchbox=0&showDomain=0&backfill=0 Attempted SQLMap injection on URL parameters: Targeted 'uuid' parameter Result: 403 Forbidden error received  Initial Attack Attempts: Hint Analysis: Hin...