<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[How I Hacked the Sri Lanka Government Information Center Database]]></title><description><![CDATA[<p dir="auto"><em><strong>How I Hacked the Sri Lanka Government Information Center Database: A Step-by-Step Guide</strong></em> <img src="https://xploitlk.com/assets/plugins/nodebb-plugin-emoji/emoji/android/1f50d.png?v=7e23c87dc8c" class="not-responsive emoji emoji-android emoji--mag" style="height:23px;width:auto;vertical-align:middle" title="🔍" alt="🔍" /><img src="https://xploitlk.com/assets/plugins/nodebb-plugin-emoji/emoji/android/1f4bb.png?v=7e23c87dc8c" class="not-responsive emoji emoji-android emoji--computer" style="height:23px;width:auto;vertical-align:middle" title="💻" alt="💻" /></p>
<p dir="auto"><img src="/assets/uploads/files/1774162157216-article.webp" alt="article.png" class=" img-fluid img-markdown" /></p>
<p dir="auto">As an aspiring ethical hacker, it’s crucial to understand the intricacies of web applications and their vulnerabilities. Today, I’ll be sharing my experience with a specific target: the Sri Lanka Government Information Center Database. This account is purely for educational purposes, so let’s dive in! <img src="https://xploitlk.com/assets/plugins/nodebb-plugin-emoji/emoji/android/1f680.png?v=7e23c87dc8c" class="not-responsive emoji emoji-android emoji--rocket" style="height:23px;width:auto;vertical-align:middle" title="🚀" alt="🚀" /></p>
<h3>Step 1: Identifying the Target <img src="https://xploitlk.com/assets/plugins/nodebb-plugin-emoji/emoji/android/1f3af.png?v=7e23c87dc8c" class="not-responsive emoji emoji-android emoji--dart" style="height:23px;width:auto;vertical-align:middle" title="🎯" alt="🎯" /></h3>
<p dir="auto">I started by exploring the target website: <a href="https://gic.gov.lk/gic/index.php/en/component/org/?id=47&amp;task=org" target="_blank" rel="noopener noreferrer nofollow ugc">https://gic.gov.lk/gic/index.php/en/component/org/?id=47&amp;task=org</a>. The URL indicated a dynamic query that hinted at a potential SQL injection vulnerability. My goal was to find a parameter that can be manipulated to gain unauthorized access.</p>
<h3>Step 2: Finding the Vulnerable Parameter <img src="https://xploitlk.com/assets/plugins/nodebb-plugin-emoji/emoji/android/1f50d.png?v=7e23c87dc8c" class="not-responsive emoji emoji-android emoji--mag" style="height:23px;width:auto;vertical-align:middle" title="🔍" alt="🔍" /></h3>
<p dir="auto">Once I loaded the page, I examined the parameters in the URL. The part ?id=47&amp;task=org was particularly interesting. Parameters like id often interact with databases, making them ideal candidates for SQL injection.</p>
<h3>Step 3: Testing for SQL Injection <img src="https://xploitlk.com/assets/plugins/nodebb-plugin-emoji/emoji/android/1f6e0.png?v=7e23c87dc8c" class="not-responsive emoji emoji-android emoji--hammer_and_wrench" style="height:23px;width:auto;vertical-align:middle" title="🛠" alt="🛠" />️</h3>
<p dir="auto">To determine if the parameter was indeed vulnerable, I decided to test it by adding a ' (single quote) at the end of the id parameter. The modified URL looked like this:</p>
<p dir="auto"><a href="https://gic.gov.lk/gic/index.php/en/component/org/?id=47" target="_blank" rel="noopener noreferrer nofollow ugc">https://gic.gov.lk/gic/index.php/en/component/org/?id=47</a>'&amp;task=org</p>
<p dir="auto">Upon visiting this URL, I encountered an SQL error message. This was a significant sign! The error indicated that the input was being processed by an SQL query, confirming a vulnerability in the parameter.</p>
<h3>Step 4: Using SQLmap for Exploitation <img src="https://xploitlk.com/assets/plugins/nodebb-plugin-emoji/emoji/android/2699.png?v=7e23c87dc8c" class="not-responsive emoji emoji-android emoji--gear" style="height:23px;width:auto;vertical-align:middle" title="⚙" alt="⚙" />️</h3>
<p dir="auto">With this information in hand, I moved to the next step, utilizing SQLmap, a powerful tool for automating the process of identifying and exploiting SQL injection flaws. I set up SQLmap with the following command:</p>
<p dir="auto">sqlmap -u "<a href="https://gic.gov.lk/gic/index.php/en/component/org/?id=47&amp;task=org" target="_blank" rel="noopener noreferrer nofollow ugc">https://gic.gov.lk/gic/index.php/en/component/org/?id=47&amp;task=org</a>" --level 5 --risk=3 --threads 10 --dbs</p>
<p dir="auto">This command effectively instructed SQLmap to analyze the URL for any databases present and retrieve information.</p>
<h3>Step 5: Accessing the Database <img src="https://xploitlk.com/assets/plugins/nodebb-plugin-emoji/emoji/android/1f4ca.png?v=7e23c87dc8c" class="not-responsive emoji emoji-android emoji--bar_chart" style="height:23px;width:auto;vertical-align:middle" title="📊" alt="📊" /></h3>
<p dir="auto">After a few moments, SQLmap listed the databases available. I was intrigued by the exposure of sensitive data. From there, I could further extract tables and, potentially, even data within those tables using subsequent SQL commands provided by SQLmap.</p>
<h3>Important Note: Ethical Considerations <img src="https://xploitlk.com/assets/plugins/nodebb-plugin-emoji/emoji/android/2696.png?v=7e23c87dc8c" class="not-responsive emoji emoji-android emoji--scales" style="height:23px;width:auto;vertical-align:middle" title="⚖" alt="⚖" />️</h3>
<p dir="auto">While this exercise was purely educational, it’s vital to remember that hacking without authorization is illegal and unethical. Ethical hacking should always be conducted with permission and within legal boundaries, primarily for the purpose of securing systems.</p>
<h3>Conclusion <img src="https://xploitlk.com/assets/plugins/nodebb-plugin-emoji/emoji/android/1f31f.png?v=7e23c87dc8c" class="not-responsive emoji emoji-android emoji--star2" style="height:23px;width:auto;vertical-align:middle" title="🌟" alt="🌟" /></h3>
<p dir="auto">Reflecting on this journey, I realized the importance of understanding vulnerabilities in web applications, as well as the tools available for testing and securing those applications. Remember, the goal of ethical hacking is to protect and improve systems, not exploit them!</p>
<p dir="auto">If you're eager to learn more about ethical hacking, always seek resources that emphasize responsible behavior and legal guidelines. Happy hacking! <img src="https://xploitlk.com/assets/plugins/nodebb-plugin-emoji/emoji/android/1f512.png?v=7e23c87dc8c" class="not-responsive emoji emoji-android emoji--lock" style="height:23px;width:auto;vertical-align:middle" title="🔒" alt="🔒" /><img src="https://xploitlk.com/assets/plugins/nodebb-plugin-emoji/emoji/android/1f468-200d-1f4bb.png?v=7e23c87dc8c" class="not-responsive emoji emoji-android emoji--male-technologist" style="height:23px;width:auto;vertical-align:middle" title="👨‍💻" alt="👨‍💻" /></p>
]]></description><link>https://xploitlk.com/topic/17/how-i-hacked-the-sri-lanka-government-information-center-database</link><generator>RSS for Node</generator><lastBuildDate>Fri, 17 Apr 2026 04:58:01 GMT</lastBuildDate><atom:link href="https://xploitlk.com/topic/17.rss" rel="self" type="application/rss+xml"/><pubDate>Sun, 22 Mar 2026 06:50:10 GMT</pubDate><ttl>60</ttl></channel></rss>