A Five Minute SQL-I

Ashish Jha
May 6, 2018 · 2 min read

Hello Myself Ashish Jha, A security researcher from INDIA, I pentested many site and now it’s time for one of india’s biggest travel company , Yes i started pentested it back an year ago and within 5 minutes of pentesting i was able to find “Blind SQL-Injection” , And That too manually :) , It was really a good experience pentesting it, As i’ve previous found SQL-I in many websites (50+).

Now let me narate you how i did that:

Step1:

Just a normal surf to the website go to book a flight.

Image for post
Image for post
Book a flight

Step2:

Next, I found add coupon option :) , That was very attractive to me and the lord of bug hunting was from somewhere sending me signals to test.

Image for post
Image for post
Add coupon point where i tested

Step3:

I added a test coupon as you can see in the above screenshot then intercepted using a burp proxy and the request was JSON one.

Image for post
Image for post
The Code parameter

Step4:

I just added a single quote as you can see in the above picture, That responded with a mysql error and that was really awesome for me as i love SQL-I vulnerabilty.

Image for post
Image for post

Step5:

I pentested more but as they were using Angular.js i was not able to get the coupons and stuff, but i got upto a good level!

Finally after two days they replied as a valid report and asked me my credentials for rewarding a bounty!

This was my five minute SQL-I journey.

I share more of my findings , untill next time!

And as i always say, Hack Like A Pro and Never think you can’t!

InfoSec Write-ups

A collection of write-ups from the best hackers in the…

Ashish Jha

Written by

Saw the purity of computers and felt in love with them. Red teamer: https://bluefire-redteam.com | Guitarist | Programmer | Love Electronics | Back-end lover

InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. In a nutshell, we are the largest InfoSec publication on Medium. Maintained by Hackrew

Ashish Jha

Written by

Saw the purity of computers and felt in love with them. Red teamer: https://bluefire-redteam.com | Guitarist | Programmer | Love Electronics | Back-end lover

InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. In a nutshell, we are the largest InfoSec publication on Medium. Maintained by Hackrew

Welcome to a place where words matter. On Medium, smart voices and original ideas take center stage - with no ads in sight. Watch
Follow all the topics you care about, and we’ll deliver the best stories for you to your homepage and inbox. Explore
Get unlimited access to the best stories on Medium — and support writers while you’re at it. Just $5/month. Upgrade

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store