So our next step is now to check for the tables in that database.
Now, the database is going to
when we go back, we'll decide which data basically want. But well, again. But
deck, You are known vulnerable Page Tak tak tables Tak d
which ever database? We want to go with you. Let's go check it out.
So here we are, back here. We're going to tack tack
and we're gonna go with exercises.
Now we see that the excess database has one table and that table is users, so that is very handy. Now we can look into that table and find for their information.
Uh, let's go back over your slides and check out. Checked it out.
we went to look at the columns
in the database website
for the table users. So they'll be tec tec columns, Tak de website
or in our case, will be exercises
intact. T users. Let's go check it out.
we have our sequel map Tak you
page tec tec columns tak d
for the database exercises intact T users for the user's table. Let's say whatever but we'll get back.
All right. From this we got aged group I D I D name and then
their password, huh?
how could we, uh, we steal his passwords off out there? How can we get that column?
Well, we conduct that column and view all the information,
so let's go back over ice allies and check that out.
So if python sickle map
dot p y tak you so same as before. All that stuff
we're gonna do tech tak dump
our database tak t for the table users to check it out.
All right, so there's take columns out and type dump,
exercise table users
see the group I d. And I d. In the age,
the name and look at that.
We've got all of the passwords
So very handy tool, too.
passwords and that cz one tool that you can use to exploit
sequel databases. She got the other tool