after that you can: Trying various XSS payloads by using XSSer's "--auto" option.
try various vul.
Custome XSS payload:
Output: under Final attack:will generate a payload use it in BurpSuite,by replacing the POST, in this case, is the Target_host=
xsser final attack pasted and forwarded in BurpSuite.
Used--Fp alert('1') hence, after forward from BurpSuite notice the target.
Get Attack:
inside a get perm in-which it's value get's reflected we can Subtitiute that var with XSS to specify we are targeting it. in an XSS command: xsser -u ""
UNION attacks, where you can retrieve data from different database tables.
Examining the database, where you can extract information about the version and structure of the database.
Blind SQL injection, where the results of a query you control are not returned in the application's responses.
⚠️ Before SQLMap:
for example test with:
checking for boolean SQLi also check false cases
to check for how many col does the Dev Select have keep increasing the 'str' until no error.
Basic SQLMap syntax:
GET req:
POST req:
<POST_str>: comes from req intercepted by Burp Proxy.
ex: --data=="user=a&pass=a" -p user
Another way is to use Burp Proxy to intercept the request then save it as a file `request`:
🍪Sometimes you might need a cookie as the vul might exists after login: --cookie=""
[options]: for exmaple --tables: to print all the tables or -b for banner
later --current-db <table_name> -columns: for each table in DB give me all col.
also add --dump: to get password hashes (for layter attacks with Hydra)
other [options]:
--fresh-queries: bruteforce again don't just show prev bruteforce results.
--technique= U for exmple Union base SQLi.
--users : get users
--dbs : get DB Names
-D <DB_Name> --tables : get tables
-D <DB_Name> -T <Table_name> --columns: get all cols
for exmaple after getting DB Table then col you can dumb it like this:
Attacking a Union based SQLi:
--technique=U tells SQLMap to use Union based SQLi on id GET param.
The --technique switch is to create less noise and prevent the service from shutting down due to query overload. If the given techniques do not work try it removing the switch.
exploiting POST param:
<POST string>: can be copied from a req intercepted with Burp Proxy.
OS-Shell
SQLi can allow us to upload a file to a server thus gaining remote access via a WebShell.