Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo
  1. Home
  2. Cybersecurity
  3. Vulnerabilities & Exploits
  4. How I Hacked the Sri Lanka Government Information Center Database

How I Hacked the Sri Lanka Government Information Center Database

Scheduled Pinned Locked Moved Vulnerabilities & Exploits
1 Posts 1 Posters 77 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • anonsathan_xdA Offline
    anonsathan_xdA Offline
    anonsathan_xd
    Global Moderator
    wrote last edited by
    #1

    How I Hacked the Sri Lanka Government Information Center Database: A Step-by-Step Guide πŸ”πŸ’»

    article.png

    As an aspiring ethical hacker, it’s crucial to understand the intricacies of web applications and their vulnerabilities. Today, I’ll be sharing my experience with a specific target: the Sri Lanka Government Information Center Database. This account is purely for educational purposes, so let’s dive in! πŸš€

    Step 1: Identifying the Target 🎯

    I started by exploring the target website: https://gic.gov.lk/gic/index.php/en/component/org/?id=47&task=org. The URL indicated a dynamic query that hinted at a potential SQL injection vulnerability. My goal was to find a parameter that can be manipulated to gain unauthorized access.

    Step 2: Finding the Vulnerable Parameter πŸ”

    Once I loaded the page, I examined the parameters in the URL. The part ?id=47&task=org was particularly interesting. Parameters like id often interact with databases, making them ideal candidates for SQL injection.

    Step 3: Testing for SQL Injection πŸ› οΈ

    To determine if the parameter was indeed vulnerable, I decided to test it by adding a ' (single quote) at the end of the id parameter. The modified URL looked like this:

    https://gic.gov.lk/gic/index.php/en/component/org/?id=47'&task=org

    Upon visiting this URL, I encountered an SQL error message. This was a significant sign! The error indicated that the input was being processed by an SQL query, confirming a vulnerability in the parameter.

    Step 4: Using SQLmap for Exploitation βš™οΈ

    With this information in hand, I moved to the next step, utilizing SQLmap, a powerful tool for automating the process of identifying and exploiting SQL injection flaws. I set up SQLmap with the following command:

    sqlmap -u "https://gic.gov.lk/gic/index.php/en/component/org/?id=47&task=org" --level 5 --risk=3 --threads 10 --dbs

    This command effectively instructed SQLmap to analyze the URL for any databases present and retrieve information.

    Step 5: Accessing the Database πŸ“Š

    After a few moments, SQLmap listed the databases available. I was intrigued by the exposure of sensitive data. From there, I could further extract tables and, potentially, even data within those tables using subsequent SQL commands provided by SQLmap.

    Important Note: Ethical Considerations βš–οΈ

    While this exercise was purely educational, it’s vital to remember that hacking without authorization is illegal and unethical. Ethical hacking should always be conducted with permission and within legal boundaries, primarily for the purpose of securing systems.

    Conclusion 🌟

    Reflecting on this journey, I realized the importance of understanding vulnerabilities in web applications, as well as the tools available for testing and securing those applications. Remember, the goal of ethical hacking is to protect and improve systems, not exploit them!

    If you're eager to learn more about ethical hacking, always seek resources that emphasize responsible behavior and legal guidelines. Happy hacking! πŸ”’πŸ‘¨β€πŸ’»

    1 Reply Last reply
    0
    Reply
    • Reply as topic
    Log in to reply
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes


    • Login

    • Don't have an account? Register

    • Login or register to search.
    • First post
      Last post
    0
    • Categories
    • Recent
    • Tags
    • Popular
    • World
    • Users
    • Groups