Login Register






Thread Rating:
  • 0 Vote(s) - 0 Average


Using Havij to find SQL vulnerability. filter_list
Author
Message
Using Havij to find SQL vulnerability. #1
TL;DR:
Read it.


For this tutorial, we will be using a tool called "Havij" to find vulnerabilities in SQL-related webpages or of that sort.

Download to Havij:
http://www.4shared.com/get/5qLfUnfn/Havi...Crack.html

Once this is installed you will need to find vulnerabilities. An easy way to get them via-forum is to look at a post link. Example?

When I posted this thread the url was "http://www.sinister.ly/newthread.php?fid=58". That there, friends, is a vulnerability. This isn't just Sinisterly. It is for any website with a special identification code appended to the url.

How do we get our shit together to find website passwords and such?

First, put your target, with the vulnerable url, in the target section and analyze it.

[Image: 2vknvvd.jpg]

Now assuming you have entered a proper url with a valid id, you can fuck shit up. If you know how.

If you don't, that's why I am here.

Once everything is loaded, if text in the giant-ass-box below is blue, it most likely provided you with a database name. This will be useful later.

Now click on "Tables" and then "Get Tables". These options only appear after a successful vulnerability was found and information of the website was in the "blue". When I say "in the blue", I mean you succeeded in your quest of finding server information.

Now click on "Get Columns" and check the third option down in the box on the left. It should bring up a table that has "id" and "password" columns in it. If it does, good job. If not, read again.

Now that you have the table, click "Get Data" to collect your desired information. It will provide you with the Admin username and password.
One problem. The password is encrypted in MD5 Hash. GREEEEAT.

Never fear, Havij is here. Just click on the "MD5" tab above with the little key and paste the password. Click "start". Just wait a minute and it will return your password, "unhashified".

Congratulations, you fucking dick-head, you. You just got yourself into a website's admin control panel.

What are you waiting for? DEFACE THEM SONS OF BITCHES.

Note: This tutorial is for educational purposes only. I am not responsible for what you do.
[Image: BXqGARG.png]

Reply

RE: Using Havij to find SQL vulnerability. #2
Are you really sure you could consider anything with a appended variable a vulnerability?

Reply

RE: Using Havij to find SQL vulnerability. #3
(02-11-2014, 03:54 AM)Satan Wrote: Are you really sure you could consider anything with a appended variable a vulnerability?

No. But more than likely.
[Image: BXqGARG.png]

Reply

RE: Using Havij to find SQL vulnerability. #4
(02-11-2014, 03:55 AM)Duubz Wrote: No. But more than likely.

You're more likely to get a hit with a known vuln. dork though.

Reply

RE: Using Havij to find SQL vulnerability. #5
I seriously hope this thread is a fucking joke.
XMPP - wrath@xmpp.jp

Reply

RE: Using Havij to find SQL vulnerability. #6
(02-11-2014, 03:59 AM)Crypt Wrote: I seriously hope this thread is a fucking joke.

The universe is a joke.

&&Gotta remember everyone starts somewhere.

Reply

RE: Using Havij to find SQL vulnerability. #7
(02-11-2014, 04:02 AM)Satan Wrote: The universe is a joke.

&&Gotta remember everyone starts somewhere.

The mentality that this is a starting point is sad. This is going to sound cheesy, but people shouldn't learn to hack, they should hack to learn. Doing this doesn't involve any learning. Going out and learning to code in c, learning assembly, reverse engineering, and exploitation development is what you should do if you want to be a 133 hacker. If your into websec then learn PHP and MySQl, go on exploitdb and figure out what is the reason that wordpress themes are vulnerable, find some wordpress vulnerabilities, learn some advanced SQLi and not just memorize strings. Shell some sites, back-connect them, and try to root them. BreShie wrote a great tut on executing privilege escalation vulnerabilities.
#MakeSinisterlySexyAgain

Reply

RE: Using Havij to find SQL vulnerability. #8
(02-11-2014, 04:12 AM)Adorapuff Wrote: The mentality that this is a starting point is sad. This is going to sound cheesy, but people shouldn't learn to hack, they should hack to learn. Doing this doesn't involve any learning. Going out and learning to code in c, learning assembly, reverse engineering, and exploitation development is what you should do if you want to be a 133 hacker. If your into websec then learn PHP and MySQl, go on exploitdb and figure out what is the reason that wordpress themes are vulnerable, find some wordpress vulnerabilities, learn some advanced SQLi and not just memorize strings. Shell some sites, back-connect them, and try to root them. BreShie wrote a great tut on executing privilege escalation vulnerabilities.

Well, I never did say that this is exactly a starting point.
& it doesn't represent my view of it either.

In my opinion, you should start with theory and work your way on from there.

Reply

RE: Using Havij to find SQL vulnerability. #9
(02-11-2014, 04:19 AM)Satan Wrote: Well, I never did say that this is exactly a starting point.
& it doesn't represent my view of it either.

In my opinion, you should start with theory and work your way on from there.

I'm not a hacker anyways. This is really something for the scriptkitties.
[Image: BXqGARG.png]

Reply

RE: Using Havij to find SQL vulnerability. #10
(02-11-2014, 04:25 AM)Duubz Wrote: I'm not a hacker anyways. This is really something for the scriptkitties.

99% of this forum are skids. including me and you.
Wavy baby

Reply







Users browsing this thread: 1 Guest(s)