Page 104 - Hands-On Bug Hunting for Penetration Testers
P. 104

SQL, Code Injection, and Scanners                                           Chapter 5

            URL

            The vulnerability's URL is provided clearly in the BSBDIOJ report:
                http://webscantest.com/datastore/search_by_id.php



            Payload

            The SQLi payload is listed prominently in both the console and HTML reports under
            injected seed:

                sleep(16000/1000);


            Methodology

            Again, only use a scanner if you're authorized to! We would report this finding as coming
            from version       of Arachni.



            Instructions to Reproduce

            Rather than simply pointing to BSBDIOJ, we want to list the steps to manually recreate the
            vulnerability we're reporting. In this case, that will be navigating to the form on the affected
            page, entering the payload, and hitting Submit. There's no encoding, DOM manipulation,
            or other tricks required.



            Attack Scenario

            When a SQL database suffers from a time-based injection attack, that vulnerability allows
            an attacker to enumerate information available in a database through the tactical use of
            expressions and the SQLi-induced pause. An attack could exfiltrate business or payment
            data, sensitive tokens/authentication credentials, or any number of other critical pieces of
            information.


            Final Report

            Let's use this information to format our submission:

                CATEGORY: Blind SQLi (time-based)
                TIME: 2018-06-18 3:23 AM (3:23) UTC


                                                    [ 89 ]
   99   100   101   102   103   104   105   106   107   108   109