SQL injection to shell
Lab Environment Attacker's Machine - Linux kali 4.13.0-kali1-amd64 #1 SMP Debian 4.13.10-1kali2 (2017-11-08) x86_64 GNU/Linux Vulnerable Machine - SQL injection to shell Proof Of Concept arp-scan --local (to scan for the machines connected to the network) vulnerable machine IP - 172.16.60.160 Now i will use nmap for further scanning the machine's IP nmap -sSCV 172.16.60.160 It revealed HTTP service on Port 80 in active state. So i just browsed the IP in browser to see the webpage (as Port 80 is running). It showed me many options on which i can click so i choose to click on test. On clicking on test parameter it showed me GET method in url which can lead to SQL injection attack . After that i just confirmed that if SQL injection attack is working or not by placing an apostrophe(‘) after id=1. It gave me the syntax error which confirmed me that SQL injection attack is working . Note: All comma...