From the course: Complete Guide to Penetration Testing
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Exploiting your way into the gym
From the course: Complete Guide to Penetration Testing
Exploiting your way into the gym
- [Instructor] Let's take a look at this gym management system, which we can download from the sourcecodetester site shown here. This is a standard website which runs on a LAMP stack system. I've downloaded and unzipped this application. We can see this is a PHP website, and if we have a look in the database folder, we can see the setup script for it. The installation instructions require us to set up the application by importing this setup script. In addition, we need to modify the dbconnect.py script and update it with our privileged SQL user credentials. I've done this already, so let's go take a look at it. 192.168.1.176/gym1. Okay, we're asked to enter credentials. Our first exploit will be the obvious one. We'll run an SQL injection by entering the user account as quote space or one equals one hash, and we've logged in as the administrative user. There's a slightly more advanced version of the gym management system that we can find at this site, and this particular variant has…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
-
-
-
A refresher on web technology8m 52s
-
(Locked)
Approaches to web testing3m 31s
-
(Locked)
Refreshing your basic web testing skills3m 59s
-
(Locked)
Fingerprinting web servers4m 44s
-
(Locked)
A refresher on web shell implants7m 32s
-
(Locked)
Web server penetration using SQLMap5m 16s
-
(Locked)
Busting open websites5m 24s
-
(Locked)
Testing websites with Burp Suite3m 33s
-
(Locked)
Exploiting message headers with Burp Suite4m 51s
-
(Locked)
Exploiting your way into the gym4m
-
(Locked)
Understanding CMS targets3m 28s
-
(Locked)
Getting into WordPress6m 1s
-
(Locked)
Shelling through WordPress2m 48s
-
(Locked)
Exploiting Joomla via SQL2m 48s
-
-
-
-
-
-
-