๐Ÿงช Lab: SQL Injection via Tracking Cookie

๐Ÿ” Lab Description:

This lab contains a SQL injection vulnerability.

The application uses a tracking cookie for analytics and performs a SQL query using the cookie value.

โš ๏ธ The SQL query results are not returned directly, but the server might leak information through error messages (e.g., type conversion or syntax errors).

๐Ÿ“‚ The database contains a table called users with the following columns:


๐ŸŒŸ Objective:

๐Ÿ•ต๏ธโ€โ™‚๏ธ Find and leak the password of the administrator user, then log in using their credentials.


๐Ÿง  Analysis:

๐Ÿ”Ž The vulnerable parameter is:

TrackingId

๐Ÿ’ก There is no direct response from the server reflecting the results of our injection, but:


๐Ÿงช Exploitation Plan: