<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Exfiltration on rchitect</title><link>https://www.rchitect.in/categories/exfiltration/</link><description>Recent content in Exfiltration on rchitect</description><generator>Hugo</generator><language>en</language><lastBuildDate>Sat, 25 Jun 2022 00:00:00 +0000</lastBuildDate><atom:link href="https://www.rchitect.in/categories/exfiltration/index.xml" rel="self" type="application/rss+xml"/><item><title>Sql injection</title><link>https://www.rchitect.in/posts/sql-inection/</link><pubDate>Sat, 25 Jun 2022 00:00:00 +0000</pubDate><guid>https://www.rchitect.in/posts/sql-inection/</guid><description>&lt;h1 id="sql-injection-methods"&gt;
 Sql Injection Methods
 &lt;a class="heading-link" href="#sql-injection-methods"&gt;
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading"&gt;&lt;/i&gt;
 &lt;span class="sr-only"&gt;Link to heading&lt;/span&gt;
 &lt;/a&gt;
&lt;/h1&gt;
&lt;h6 id="how-to-identify-sql-injection"&gt;
 How to identify SQL injection
 &lt;a class="heading-link" href="#how-to-identify-sql-injection"&gt;
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading"&gt;&lt;/i&gt;
 &lt;span class="sr-only"&gt;Link to heading&lt;/span&gt;
 &lt;/a&gt;
&lt;/h6&gt;
&lt;p&gt;Refer below webpage( a smaple hotel reservation website) from the hackthebox machine.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://www.rchitect.in/images/walk/jarvis/5.png" alt="sql"&gt;&lt;/p&gt;
&lt;p&gt;I am going to add &amp;rsquo; and see if there are any erros.&lt;/p&gt;
&lt;p&gt;Actual url&lt;/p&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;http://10.10.10.143/room.php?cod=1
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;img src="https://www.rchitect.in/images/walk/jarvis/6.png" alt="sql"&gt;&lt;/p&gt;
&lt;p&gt;SQL inection tested url&lt;/p&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;http://10.10.10.143/room.php?cod=1&amp;#39;
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;There are no errors and the page seems broken. This gives hint for SQL injection vulnarability.&lt;/p&gt;</description></item></channel></rss>