Skip to content
This lab is created to demonstrate pass-the-hash, 2nd order sql injection and type juggling vulnerabilities
Branch: master
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
README.md
exploit.zip
trouble1_whiteBox.zip
whitebox_pentesting_and_exploit_development.pdf

README.md

White-box-pentesting

This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities

Your goal

Do a source code review to find the following vulnerabilities and get logged in admin's account.

And get a reverse shell.

You can email me the walkthrough of your findings and scripts for exploiting.

email id: raunakparmar786@gmail.com

difficult level - Intermediate

Setup

unzip the trouble1_whiteBox.zip in /var/www/html/

Configuration in config.php

Replace mysql credentials with your credentials

<?php
   define('DB_SERVER', 'localhost');
   define('DB_USERNAME', 'root');
   define('DB_PASSWORD', 'toor');
   define('DB_DATABASE', 'trouble1');
   $db = mysqli_connect(DB_SERVER,DB_USERNAME,DB_PASSWORD,DB_DATABASE);
?>

setup database

root@kali:/var/www/html# service mysql start
root@kali:/var/www/html# mysql -u root -p -e "create database trouble1"
root@kali:/var/www/html# mysql -u root -p trouble1 < lab.sql
contact me on twitter for any help https://twitter.com/trouble1_raunak
You can’t perform that action at this time.