Skills Assessment

Scenario

Target: Doner 4 You website Claimed Stack: "HTML + CSS" πŸ€”

Objectives:

  1. Find and exploit blind SQLi to dump admin password

  2. Crack the hash and login

  3. Find second SQLi and gain RCE

  4. Capture and crack NetNTLM hash


Phase 1: Discovery

Finding the Injection Point

Intercept requests and notice TrackingId cookie - likely stored in database.

Testing for Time-based SQLi

Payload:

';IF(1=1) WAITFOR DELAY '0:0:10';--

URL Encode:

Result: 10 second delay = SQLi confirmed!


Phase 2: Database Enumeration

Oracle Script

Step 1: Database Name

Step 2: Table Count

Step 3: Table Names

Results: captcha, tracking, users (+ system tables)

Step 4: Column Names (users table)

Step 5: Row Count

Step 6: Extract Admin Credentials


Phase 3: Crack Password Hash

Credentials obtained: admin@d4y.at:<PASSWORD>


Phase 4: Second SQLi β†’ RCE

Login as Admin

Use cracked credentials to login.

Find Second Injection

Navigate to "Create Post" - fuzz all fields.

Vulnerable field: captchaAnswer

Test Time-based SQLi

10 second delay = SQLi confirmed!

Enable xp_cmdshell

Step 1: Enable Advanced Options

Step 2: Enable xp_cmdshell

Get Reverse Shell

PowerShell Payload:

Encode:

Final SQLi Payload:

Setup & Execute

Read Flag


Phase 5: Capture NetNTLM Hash

Start Responder

Trigger SMB Authentication

URL Encode:

Send via SQLi

Capture Hash

Crack Hash


Attack Chain Summary


Techniques Used

Technique
Phase

Time-based Blind SQLi

Discovery

SQL-Anding extraction

Enumeration

Hash cracking (MD5)

Credential access

xp_cmdshell RCE

Exploitation

PowerShell encoded payload

Evasion

xp_dirtree SMB coercion

Hash capture

NetNTLMv2 cracking

Credential access


Key Learnings

  1. Check all input vectors - Cookies, headers, form fields

  2. Time-based SQLi - Useful when no visible output

  3. SQL-Anding - Efficient extraction (7 requests/char)

  4. Chain vulnerabilities - SQLi β†’ RCE β†’ Hash capture

  5. Multiple injection points - Same app can have several

Last updated