<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SQL Injection on Chief Dennis' Blog</title><link>https://chiefdennis.github.io/tags/sql-injection/</link><description>Recent content in SQL Injection on Chief Dennis' Blog</description><generator>Hugo</generator><language>en</language><lastBuildDate>Sun, 18 May 2025 13:07:16 +0100</lastBuildDate><atom:link href="https://chiefdennis.github.io/tags/sql-injection/index.xml" rel="self" type="application/rss+xml"/><item><title>Cockpit Offsec Walkthrough</title><link>https://chiefdennis.github.io/posts/offsec_cockpit/</link><pubDate>Sun, 18 May 2025 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/offsec_cockpit/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/offsec_cockpit/image0.png" alt="image">&lt;/p>
&lt;h2 id="introduction">
 Introduction
 &lt;a class="heading-link" href="#introduction">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;h3 id="sql-injection-vulnerability">
 SQL injection vulnerability
 &lt;a class="heading-link" href="#sql-injection-vulnerability">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h3>
&lt;p>A SQL Injection (SQLi) vulnerability is one of the most critical threatsin web applications that interact with databases. This vulnerability occurs when an application does not properly validate and sanitize user input before using it in SQL queries, allowing an attacker to manipulate these queries to access, modify, or delete data in the database.&lt;/p></description></item><item><title>Usage HTB Walkthrough</title><link>https://chiefdennis.github.io/posts/htb_usage/</link><pubDate>Wed, 29 May 2024 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/htb_usage/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_usage/Scr_20.png#centre" alt="image">&lt;/p>
&lt;p>The Usage HTB machine is a madium difficulty level HackTheBox Machine. The main techniques and tools used to crack this machine are:&lt;/p>
&lt;pre>&lt;code>- Blind SQL injection with SQLmap
- Burpsuite
- Hash cracking with JohnTheRipper
- 7z Wildcard Spare exploitation
&lt;/code>&lt;/pre>
&lt;h2 id="reconnaissance">
 Reconnaissance
 &lt;a class="heading-link" href="#reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>We start a broad Nmap scan by executing the following command:&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-sh" data-lang="sh">&lt;span class="line">&lt;span class="cl">sudo nmap -sS -T5 -vvv -p- 10.10.11.18 -Pn -oG nmap_inicial
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>Where the arguments mean:&lt;/p></description></item><item><title>Monitored HTB Walkthrough</title><link>https://chiefdennis.github.io/posts/htb_monitored/</link><pubDate>Sat, 17 Feb 2024 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/htb_monitored/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_monitored/Screenshot_20.png" alt="image">&lt;/p>
&lt;p>The Monitored HTB machine is a medium difficulty level HackTheBox Machine. The main tools and techniques used to crack this machine are:&lt;/p>
&lt;pre>&lt;code> - Dirsearch
 - CVE-2023-40931
 - NMAP UDP scan
 - SNMP enumeration with SNMPwalk
 - JohnTheRipper
 - SQL injection with SQLmap
&lt;/code>&lt;/pre>
&lt;h2 id="reconnaissance">
 Reconnaissance
 &lt;a class="heading-link" href="#reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>We start a broad Nmap TCP scan by executing the following command:&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-sh" data-lang="sh">&lt;span class="line">&lt;span class="cl">sudo nmap -sS -T5 -vvv -p- 10.10.11.248 -Pn -oG nmap_inicial
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>Where the arguments mean:&lt;/p></description></item><item><title>Clicker HTB Walkthrough</title><link>https://chiefdennis.github.io/posts/htb_clicker/</link><pubDate>Mon, 27 Nov 2023 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/htb_clicker/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_clicker/clicker.jpg" alt="image">&lt;/p>
&lt;p>The Clicker HTB machine is a medium difficulty level HackTheBox Machine. The main techniques used to crack this machine are:&lt;/p>
&lt;pre>&lt;code>- SQL Injection
- CRLF Injection
- Parameter Tampering
- PHP Reverse Shell
- Perl_startup Local Privilege Escalation
&lt;/code>&lt;/pre>
&lt;h2 id="reconnaissance">
 Reconnaissance
 &lt;a class="heading-link" href="#reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>We start a broad Nmap scan by executing the following command:&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-sh" data-lang="sh">&lt;span class="line">&lt;span class="cl">sudo nmap -sS -T5 -vvv -p- 10.10.11.232 -Pn -oG nmap_inicial
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>Where the arguments mean:&lt;/p></description></item></channel></rss>