Test Website for Vulnerability
Sometimes this might not work in that case we need to specify the fields that need to be tested
Burp Suite - Repeater - Request (Replace the payload values with *
e.g. username=*&password=*
: Save as file
Retrieve Database Names
All Tables from Database
Columns from Table
View Data from Column
Flags
-u URL
: Target URL
--level=5
: Through Scan (Default : 1)
--risk=3
: Risk Level (Default : 1)
-r filename
: Provide the request file
--random-agent
: Request blocked by firewall
--dump
: Exploit Vulnerability Save result to file
--string "string"
: String present on result page (Required for Blind Injection)
--dbms=dbms-name
: Pass Database Type (MySQL, PostgreSQL, etc.)
--technique
: BEUSTQ
B
: Boolean-based blind
E
: Error-based
U
: Union query-based
S
: Stacked queries
T
: Time-based blind
Q
: Inline queries