Tutorials | Challenges | Tools | Downloads | Resources | Documentaries

Finding & hacking vulnerable SQLi website | Featuring BLACKBOx | Part 1

In part 1 of this tutorial, we will search the internet for SQLi vulnerable sites by using a tool called BLACKBOx created by BL4CK3C

[Image: bewbakbox.png]

This tool has many great features, which will all be covered in other tutorials.

First, let's take a look at the standard method used to find SQLi vulnerable site.
The most common way is to type the Google Dork inurl:php?id= into the Google search engine. This can be done with or without adding a number after = 
For example, inurl:php?id=1 or inurl:php?id=33

[Image: google.png]

From here, we just click on a website of our choice, then we see the website load and look normal. If we add a   '  to the end of the website's URL, and see the following response, we know that it is SQLi Vulnerable.

[Image: syntaxerror.png]

Note: If we don't see the above error message, this doesn't mean that the URL of the website isn't SQLi vulnerable, as there's a chance that a BLIND injection is possible. Spotting the signs of a BLIND injection can range from - seeing a white page, the disappearance of some website content, or even no change at all. Therefore, most people would advise you to just move on to another site, if you're not targeting that site in particular.
But having said that, I have had success with BLIND injections.

There are disadvantages to using Google Search to find targets. A few are:

1) Google searching is time-consuming
2) Confirming if the website is vuln is time-consuming
3) Other hackers have already tried the top results

To avoid those disadvantages, we can use BLACKBOx

To install BLACKBOx, we can type the following into your terminal, one-by-one:

sudo apt-get install python-passlib python-pexpect

git clone https://gitlab.com/BL4CKS3C/blackbox.git

cd blackbox

sudo chmod +x install

sudo ./install

Now we have done that, we use can open BLACKBOx and see it's features by opening a terminal, then typing blackbox -h
[Image: 1.png]

We need to use google_dorker and see it's required input.
Let's type: blackbox google_dorker -h

[Image: 2.png]

Our goal is to search the internet using the Google Dork: inurl:php?id= then test the found websites for a SQLi vulnerablility, by typing:
blackbox google_dorker --dork="php?id=" --level 8 --sqli
Note: --level can be changed to your liking.

[Image: 3.png]

We saw above that 10 results were found, and now BLACKBOx will tell us if those sites are vulnerable to SQLi.

[Image: 4.png]

If we try this this process again, we will sometimes see different results, which give us more of a chance to be the only hacker to have tried hacking that particular website.

In Part 2 we will hack into a databases via the SQLi vulnerabilities, then find usernames, passwords, and other sensitive information.

Post a Comment



{twitter https://twitter.com/ghhackers}

Contact Form


Email *

Message *

Powered by Blogger.
Javascript DisablePlease Enable Javascript To See All Widget