Extra SQLi levels
Not sure if I’m doing something against the rules but it’s not like I’m advertising since it’s something I don’t gain anything with. Anyway, I’m runing a vm with some SQLi vulnerable pages that you can exploit. There is a username and pass field the idea is to get the “Logged in” response. Here’s the address:
http://itcrash.ddns.net:8888/ or if you can’t access it: http://95.93.162.57:8888
Just browse each directory and open the html files. They are ordered in difficulty (at least according to me). Here’s the difficulty levels:
Sql1-sql3 - Basic
Sql4-Sql6 - Slightly harder
Sql7-Sql9 - Intermediate
Sql10-Sql12 - Slightly Advanced
Haven’t gotten around to adding “levels” with WAFs and such but trying to do it on my free time.
I am also going to add a cool index page to link to all the Sql Levels so it looks pretty :)
PS: I was just made aware that Sql9 is not working properly, I will fix it as soon as I can.
I just thought of doing this because this website was very little and too basic SQLi levels, with this server to the mixture you will have a lot more to practice and improve SQLi.
Enjoy ;)
Btw maybe you could post your solutions here or create another thread or not at all, I don’t know it’s going to be useful but I hope it is!
I would greatly appreciate it if you guys left some feedback whether you think it is useful or not :)
Note: I can’t guarrantee that the server will be up 100% of the time so if it is offline just try again later. also, yes that is my ip but don’t bother going off-scope as the rest of the network is secure and isolated.
“You can patch a security vulnerability on a computer but there is no patch for stupidity or, rather, guilibility.”
solutions:
http://itcrash.ddns.net:8888/sql1/sql.html :
username= ‘ or 1 –
password= ’ or 1 –[/Spoiler]http://itcrash.ddns.net:8888/sql2/sql.html :
<!- username= ‘ or 1 –
password= ’ or 1 –
http://itcrash.ddns.net:8888/sql3/sql.html :
[Spoiler]inspect (ctrl+maj+i) / open body,
maxlength=“5/”>
to maxlength=“20/” for username and password
username= ‘ or 1 –
password= ’ or 1 – -!>
i work on next
non
Nice work! I’m glad you’re enjoying it :p By the way I believe there is an issue with Sql9 but haven’t got around to fix it yet :)
“You can patch a security vulnerability on a computer but there is no patch for stupidity or, rather, guilibility.”
Human Stupidity , thats why Hackers always win.
? Med Amine Khelifi
Found a better solution for http://itcrash.ddns.net:8888/sql3/sql.html
Username: ‘-
Password: ’-
Human Stupidity , thats why Hackers always win.
? Med Amine Khelifi
“You can patch a security vulnerability on a computer but there is no patch for stupidity or, rather, guilibility.”
If you can’t access the server try with the ip: http://95.93.162.57:8888
“You can patch a security vulnerability on a computer but there is no patch for stupidity or, rather, guilibility.”
Human Stupidity , thats why Hackers always win.
? Med Amine Khelifi
Yeah as I said it is isolated the only thing you could hack into is the VM :p
PS: You don’t need nmap a simple ping itcrash.ddns.net would have worked ;)
“You can patch a security vulnerability on a computer but there is no patch for stupidity or, rather, guilibility.”
No man has a good enough memory to be a successful liar.
“You can patch a security vulnerability on a computer but there is no patch for stupidity or, rather, guilibility.”
Human Stupidity , thats why Hackers always win.
? Med Amine Khelifi
Hello guys!
Here is the solution for level 5 since no one got yet again :D
[Spoiler] user: \‘ password: ’ OR 1=1– -
No man has a good enough memory to be a successful liar.
“You can patch a security vulnerability on a computer but there is no patch for stupidity or, rather, guilibility.”
ok… so…. I think I should improve my SQL knowledge
actually I’m following a HTML5, PHP & MYSQL and JS course
the three of them at the same time B)
Human Stupidity , thats why Hackers always win.
? Med Amine Khelifi
“You can patch a security vulnerability on a computer but there is no patch for stupidity or, rather, guilibility.”
L00PeR
True, I could do that, only thing is I can’t know the usernames I only have access to the IPs that connect not the users on this website :p
“You can patch a security vulnerability on a computer but there is no patch for stupidity or, rather, guilibility.”
Maybe what I could do is when I make the index page and links for all levels so it looks pretty I also add a text field so you can input your HackThis username and I can log tries as well
“You can patch a security vulnerability on a computer but there is no patch for stupidity or, rather, guilibility.”
Well maybe after they completed the level tou could add like a input so we could write our usernames
Edit: You type faster than me xD
Human Stupidity , thats why Hackers always win.
? Med Amine Khelifi
“You can patch a security vulnerability on a computer but there is no patch for stupidity or, rather, guilibility.”
Ok good luck !!
I would help you coding but on my course we haven’t reached yet to managing DB’s :(
Human Stupidity , thats why Hackers always win.
? Med Amine Khelifi
No problem :). I’ll probably take a while because I have loads of projects I’m wotking on right now
“You can patch a security vulnerability on a computer but there is no patch for stupidity or, rather, guilibility.”
can someone explain me the utility of the last >> -[/Spoiler] in this <!- \‘ or 1 – - and this ? [Spoiler]\’ -!>
non
Sure:
The last - is because sometimes it the comment – or # will not work without you writing something afterwards, it depends on many varibles so it’s always good practice to write something in front of the final line comment while doing sql injection[/Spoiler]
- [Spoiler]the \‘ is used because let’s say that the php file is coded so that it tried to disable you from using quotes by entering another quote when you type a quote. So you type ’ and it becomes ‘’
By typing \‘ you are escaping yourn own quote so that it becomes \’‘ the first quote is escaped and the second works normally.
Just something that some programmers actually do to protect their code eitehr because they are incompetent or lazy or the company doesn’t have the resources to update it. You see these kinds of things often in old codes when SQL injection wasn’t “a thing” so it remained that way and nowadays they don’t have the resources to pay developers to fix it and/or can’t afford the downtime, etc…
- [Spoiler]the \‘ is used because let’s say that the php file is coded so that it tried to disable you from using quotes by entering another quote when you type a quote. So you type ’ and it becomes ‘’
“You can patch a security vulnerability on a computer but there is no patch for stupidity or, rather, guilibility.”
Perfect explanation :)
A trick for making SQL injections easier would be making some information gathering (on GitHub) and searching the .php file which checks your input, so you know how does the program work and you know how to exploit it.
Human Stupidity , thats why Hackers always win.
? Med Amine Khelifi
@darkarp i’m so stupid, for the second explain i already know this, i just forget for some minutes… but thank you, really clear
non
“You can patch a security vulnerability on a computer but there is no patch for stupidity or, rather, guilibility.”
Sorry for the downtime, up and runing again. Soon there will be new design and an option to put your HackThis username!
“You can patch a security vulnerability on a computer but there is no patch for stupidity or, rather, guilibility.”
Nice !! :)
Try persuading @Mugiwara27 so this levels are added to the Hackthis SQLi levels so you get the “helper” medal xD
Human Stupidity , thats why Hackers always win.
? Med Amine Khelifi
I’m not the one having enough power to do it, only Flabby can do it :p
But I’ll get in touch with him tho
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ‘\’‘ at line 1
Hey darkarp! I was checking it out, thanks a lot for these extra levels. Youre definitely doing your part to facilitate curiosity and new challenges. Pardon my possibly novice question, but would we be able to use conventional Kali tools such as sqlmap to scan the links to your SQL inputs sites? I know the link does not have the php? id= that i’m use to seeing with sites most apparently vulnerable to SQL injection. To answer my own question I must say that I dont believe it would work just because we are not actually connected to a database in your extra levels (I dont believe). If that is true, is there anyway to create a vulnerable site that SQL injection automation tools would work with?
You can use SQLmap for these levels as well but in a different way. You can use burp suite for instance to capture the request and save it to a txt file. And then use “sqlmap -r request.txt” and you’re set. For other levels you might also want to add some other scripts like tamper scripts and so on.
“You can patch a security vulnerability on a computer but there is no patch for stupidity or, rather, guilibility.”
I apologise for this being down, I’ve recently taken a big turn in my professional carreer and fear I no longer have the time to update and maintain this any longer
“You can patch a security vulnerability on a computer but there is no patch for stupidity or, rather, guilibility.”