Level 14 - Level 15
Last updated
Last updated
This time we got an input field, which checks whether the given username exists and also we got the link to the source code.
Let's take a look at the source code.
The input field is vulnerable to SQL Injection and also from the source code, we can identify the current database name and table name as natas15
and users
respectively.
I first checked whether the SQL injection works by using the same payload that we used in the last level.
Next I just gave "
as the payload, looking out for clues in error thrown in the response, but no details were disclosed in the error.
Since, no details were disclosed, we have to check for blind and time based SQL injection. So, I captured the request using burpsuite and saved the request to a file to test the input field with sqlmap.
From the results of sqlmap, we can see that the input field is vulnerable to boolean-based blind SQL injection. Since we know the current database name and the table name, I directly dumped the table, in which the password for the next level is present.