Skills Assessment
Scenario
Target: Doner 4 You website Claimed Stack: "HTML + CSS" π€
Objectives:
Find and exploit blind SQLi to dump admin password
Crack the hash and login
Find second SQLi and gain RCE
Capture and crack NetNTLM hash
Phase 1: Discovery
Finding the Injection Point
Intercept requests and notice TrackingId cookie - likely stored in database.
Testing for Time-based SQLi
Payload:
';IF(1=1) WAITFOR DELAY '0:0:10';--URL Encode:
Result: 10 second delay = SQLi confirmed!
Phase 2: Database Enumeration
Oracle Script
Step 1: Database Name
Step 2: Table Count
Step 3: Table Names
Results: captcha, tracking, users (+ system tables)
Step 4: Column Names (users table)
Step 5: Row Count
Step 6: Extract Admin Credentials
Phase 3: Crack Password Hash
Credentials obtained: admin@d4y.at:<PASSWORD>
Phase 4: Second SQLi β RCE
Login as Admin
Use cracked credentials to login.
Find Second Injection
Navigate to "Create Post" - fuzz all fields.
Vulnerable field: captchaAnswer
Test Time-based SQLi
10 second delay = SQLi confirmed!
Enable xp_cmdshell
Step 1: Enable Advanced Options
Step 2: Enable xp_cmdshell
Get Reverse Shell
PowerShell Payload:
Encode:
Final SQLi Payload:
Setup & Execute
Read Flag
Phase 5: Capture NetNTLM Hash
Start Responder
Trigger SMB Authentication
URL Encode:
Send via SQLi
Capture Hash
Crack Hash
Attack Chain Summary
Techniques Used
Time-based Blind SQLi
Discovery
SQL-Anding extraction
Enumeration
Hash cracking (MD5)
Credential access
xp_cmdshell RCE
Exploitation
PowerShell encoded payload
Evasion
xp_dirtree SMB coercion
Hash capture
NetNTLMv2 cracking
Credential access
Key Learnings
Check all input vectors - Cookies, headers, form fields
Time-based SQLi - Useful when no visible output
SQL-Anding - Efficient extraction (7 requests/char)
Chain vulnerabilities - SQLi β RCE β Hash capture
Multiple injection points - Same app can have several
Last updated