next, we're gonna show you a secret map. So here's some syntax for sequel map. Know if he
had the Secret Map script rather than having a brainstorm, you would have to type Python sequel map dot p y. However, we already have a pre installed, so you'll just need a type sequel map. Then you will type attack you
attack us for the Earl. After that, you would type the Earl
for us will be the I. P address of the
When we do tack tack forms
wait. That means it'll parts through and test all the forms.
which is not interactive mode. So usually secret map will ask you a whole bunch of questions. This just accept all of the default answers for you.
Tec Tec crawl equals 10. So how deep do you want to cross site? Meaning,
you know, if it finds all the pages how far down the rabbit hole doesn't Do you want to go with all these other pages? You necessarily don't want it to follow every single page, especially if you have something like
if you own a website like Facebook or some other kind of site where users have user profiles, and now they're all linked to each other. You don't want your program to just be running and tell a ghost through every single user profile, because
the user profile pages are gonna have the same vulnerabilities if they do have a vulnerability
and then tack tack level.
Um, it's different from the level of tests like crawl
how in depth do you want this test to go
and then tack tack risk is,
are you really worried about
causing a lot of noise and traffic? Are are you worried about
possibly crashing something? We're not worried about this sore wrist. He's gonna be three when we do it. All right, let's go check it out. All right, here we are in our Callie environment. We have sequel map. Tak you. We have our I p address forms batch crawl,
vehicles five, and risk
legal. Three crawl is gonna be level one, because we really don't need to crawl. This everything that we need is gonna be right there at face value right on that one page.
All right, let's hit. Enter here.
And it starts running through its tests of sequel vulnerabilities.
Now you could see it started on excess s example. One. Now it's going to go through a whole gamut of tests,
and we know there's a sequel. Vulnerabilities on
across that scripting example. One piece, So we're gonna dio has hit
It's gonna ask. Guess if we want to get the current test
Good. An expert I'm gonna change for but rebels verbosity
We see you jumped over that test.
that's good if there's a test of tanking,
But we wanted to skip over the entire page. We're gonna hit control C again. You gotta hit E
and it jumps over to the next patient. Always see here. That's going to example, too,
Hit control C again. And we're gonna keep doing this until
get over into our sequel. Injection pages were example Four
Example. Seven. We're getting close
I believe we're in our first sequel Injection page here.
we're gonna do a quick hop over here.
saw me accidentally exit it.
Be very careful with what command you type. Or else you will mess up your scan like that.
Let's quickly get back there all quick here.
All right. We're in our first sequel Injection page.
Now it's gonna run through a whole gamut of test here,
I ran this before, and sometimes you could take a little bit of time. Sometimes I could take a long time, but here we see it. It took relatively quick time,
and we have detected a sequel injection vulnerability here.
And it's telling us, Ah, whole gamut of information here
tells us the type of test it was used.
We got a blind sequel, injection and ah bullion and or blind a union query.
hell came back as identifying that there was a vulnerability here.
Now it also tells us some additional database information here, which is extremely helpful if we want to further exploit this. So it tells us what's my sequel database? The Web application uses PHP and Apache, and the operating system is Lennox Tevye. And six, when it comes time to exploit,
this information will be very handy.