0% found this document useful (0 votes)
8 views11 pages

20bce1965 Lab10

The document outlines a step-by-step procedure for performing SQL Injection using SQLMap on Kali Linux against a Metasploitable 2 environment. It includes instructions for accessing the Mutillidae web application, modifying configuration files, and executing SQLMap commands to extract database information. The process involves checking for authentication errors and retrieving data from the users table in the DVWA database.

Uploaded by

vishalvyshnav257
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views11 pages

20bce1965 Lab10

The document outlines a step-by-step procedure for performing SQL Injection using SQLMap on Kali Linux against a Metasploitable 2 environment. It includes instructions for accessing the Mutillidae web application, modifying configuration files, and executing SQLMap commands to extract database information. The process involves checking for authentication errors and retrieving data from the users table in the DVWA database.

Uploaded by

vishalvyshnav257
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Name: Vishal Vyshnav A

Reg No: 20BCE1965


LAB-10: SQL Injection

Question:
Perform SQL Injection using SQLMap on Kali Linux
Solution:

Open Metasploitable 2 and fetch IP Address.

Open Kali Linux Browser and enter Metasploitable 2 IP.


Open Mutillidae-> OWASP Top 10-> Injection-> Extract Data-> User Info.
Enter both Name and Password as ‘test’
Open Metasploitable 2 configuration file using ‘sudo nano
/var/www/mutillidae/config.inc’ and change $dbname to ‘owasp10’.
Open browser in Kali Linux and enter the same Name and Password. Check if you
get AuthenticationError.
Copy the URL of this webpage.
Open new Kali Root Terminal and use ‘sqlmap -h’ to view options.
Use command ‘sqlmap -u “<copied link>” --dbs’ to view databases inside the
copied URL. Press ‘y’ to indicate ‘Yes’ for follow-up questions.

Use command ‘sqlmap -u “<copied link>” -D dvwa --tables’ to view tables inside
the DVWA Database. Press ‘y’ to indicate ‘Yes’ for follow-up questions.
Use command ‘sqlmap -u “<copied link>” -D dvwa -T users --columns’ to view
columns inside the users table. Press ‘y’ to indicate ‘Yes’ for follow-up questions.

Use command ‘sqlmap -u “<copied link>” -D dvwa -T users --dump’ to view all
data inside the users table. Press ‘y’ to indicate ‘Yes’ for follow-up questions.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy