[POST]SQL injection with Live HTTP Headers

Standard

Download :
Mozilla Firefox : https://addons.mozilla.org/ro/firefox/addon/live-http-headers/
Google Chrome : https://chrome.google.com/webstore/detail/live-http-headers/iaiioopjkcekapmldfgbebdclcnpgnlo

Suppose we have a site that we want to test if we login and e sqli vulnerable.

The site will look like

Username :

Pasword :

Click for finish

Writing to a random username and password the same. But do not give the “Click for finish” enter the menu of Mozilla Firefox-> Tools-> Live HTTP Headers-> tick Capture.
Now press the button “Click for finish” .

Now we look at the live http headers and see what has captured and somewhere in the middle or a susu pages to find a parameter likeusername = random & pass = random & id = 2″. Please click on this parameter and press Replay bottom left.

Now try to see who is vulnerable by putting the sign at the end values ​​of the parameters.
And we see that id = 2 is vulnerable because we display a MySQL error.

Leave a comment