DVWA Exercises 6
Last updated
Last updated
In contrast to more regular SQL injections, a blind SQL injection can usually only be used to get true/false results. Since exfiltrating values this way will take hundreds or even thousands of requests, automated tools are often used. Some write their own, but most people use sqlmap. Fortunately, it has already been installed for you and is ready for use.
Let's try sqlmap:
To find the session id cookie we can type document.cookie
in the console:
First I've tried to go ahead with the following parameters:
I didn't had success with this one. For some reasons it said the parameter id is not injectable!
Let's start burp and catching the get request when submitting a ID.
In burp I'll modify the get request, set the parameter ?id=1 to ?id=1* and save the whole request to a file.