0xma Cyber Security Articles




July 27, 2022

Time-Based SQL Injection - Example 01

In this tutorial, we will see how to perform a time-based SQL injection attack on a Wordpress website. We will see how to determine what DBMS is in use, names of the databases on the system, the tables in the databases, and finally we will see how to dump the contents of the databases.

Using the --technique=T option tells sqlmap to use time-based SQL injection technique. It identifies the DBMS to be MySQL.

Running time-based sql injection to determine the DBMS type. Running time-based sql injection to determine the DBMS type.

The --dbs option tells sqlmap to find the databases on the target. It was able to find two databases: information_schema and wordpress.

Running sqlmap to determine the database names on the target. Running sqlmap to determine the database names on the target.

The --tables option reveals the table names in the "wordpress" database. It was able to find forty tables in the database.

Running sqlmap to find the tables in a database. Running sqlmap to find the tables in a database.

The --columns option reveals the column names in the "wp_users" table. This table has ten columns.

Running sqlmap to find column names in the table. Running sqlmap to find column names in the table.

The --dump option dumps the contents of the wp_users table.

Dumping the contents of the table using sqlmap. Dumping the contents of the table using sqlmap.

We can also add a "WHERE" clause to extract a specific row from the table. In this case, it is returning the row with the ID of 1.

Running sqlmap to retrieve a specific row from the table. Running sqlmap to retrieve a specific row from the table.

If you liked reading this article, you can follow me on Twitter: 0xmaCyberSec.