Home » Learning Series: How to detect vulnerabilities in the application

Learning Series: How to detect vulnerabilities in the application

by ThreatNinja
0 comment

In this post, I would like to share my experience on how to detect some vulnerabilities within the application itself. A lot of people did ask me how I manage to detect any vulnerabilities with no information (blindly) at all while playing the CTF game.

There are a lot of ways to detect vulnerabilities within the application such as the application’s version which can tell the threat actors about the application that has been installed within the server.

For the demonstration in this post, I will share some well-known attacks such as SQL Injection and Local File Inclusion
First vulnerability: SQL Injection on the application

Normally, we will test whenever the login page appears on the web application itself. The demonstration comes from here

Let’s open our burpsuite tool to analyze the packet.

Let’s inspect the packet

I try to use an error SQL Injection on the website but didn’t see anything at all.

Therefore, let’s try using a very common SQL Injection and it was a success.

As a result, let’s enumerate the SQL Injection using union based

On the website interface, we got the message “Welcome 4” and it was successful.

The screenshot above shows 4’s profile.

We should be able to enumerate the SQL Database deeper by using the syntax ‘ union select 1,2,3,database()- –

It was a success and it show the main

Next, we can use the syntax ‘ union select 1,2,3,concat(schema_name, ‘:’) from information_schema.schemata- –

It is also successful and it shows information_schema:main:
Second Vulnerabilities: Local File Inclusion (LFI) attack

The vulnerability comes from here

On the website interface, nothing much that we can take advantage but I did notice that the Website’s URL is vulnerable to Local File Inclusion

Therefore, let’s test our theories on the website.

Sadly, we got a blank page when trying to execute the LFI attack but it works pretty well with BurpSuite.

The post Learning Series: How to detect vulnerabilities in the application appeared first on Threatninja.net.

Source: Read More

You may also like

Leave a Comment

CyberNonStop

Cybernonstop is created to bring news and knowledge through articles to visitors.

Do not forget to subscribe.

Laest News

@2021 – All Right Reserved. Designed and Developed by PenciDesign