Simulate a real-world pentest where you exploit a GROUP BY-based SQL injection to leak sensitive MySQL schema details using error-based techniques in a business product catalog application.
- Identify and test SQL injection points.
- Exploit GROUP BY to trigger informative MySQL error messages.
- Extract backend technology information (MySQL version) via crafted errors.
Intermediate
45 minutes
- Basic knowledge of SQL syntax and injection attacks
- Familiarity with HTTP requests and web debugging
- Comfort with error message analysis
- Error-based SQL injection with GROUP BY
- Interpreting MySQL error messages for information extraction
- Payload crafting for information disclosure
- folder: build
- folder: deploy
- folder: test
- folder: docs
- file: README.md
- file: .gitignore
Prerequisites: Docker and docker-compose installed locally.
Installation:
- Clone the repo
- Run
docker-compose up
- Access http://localhost:3206/lab