Today I will to show you how to find vulnerabilities in web pages through error message in a very short time.
What’s a Error Massage
Error messages are notifications that are displayed on a web page due to multiple factors, but among them a misconfiguration in a web server and its applications. This can reveal very important information to an adversary who wants to take control of a system.
Target
The first thing to do is look for some vulnerable parameters on my website (<targetdomain.com>) with the help of Google Dork. The syntax is the following: “inurl:<SearchVulnerablePHPScript> site:<TargetDomain>”.
In this search, we found 10 possible URLs for the potential vulnerable target.
Now I will save the results from the Google home page in a .html file and use grep to extract the URLs, and use sort to remove duplicate lines.
Check parameters
Now I will use some SQL payloads to find out if the parameter is injectable. We copy a random URL from the previous results and enter it in the search bar of our browser. Then we add our payload as a value for the possible vulnerable parameter
Send attack
I’ll use sqmlap to try to enumerate their database. This server uses MariaDB as DBMS
As you can see, sqlmap was able to enumerate the web server (Apache) databases, using some parameters ( — level and — risk) and modules like between to bypass the WAF. Thank you for reading 🙂