MultiForm SQLi Technique

Noted:
Total: 111 words


If you are performing an SQL Injection attack on your target and encounter Content-Type: multipart/form-data where do you start the attack?

For example:

multi

Since there is no traditional way like username=admin&password=password where do we inject our payload?

You can inject the payload as well. It’s similar to the traditional method, but the locations are different. First, observe the value for “username” in line 26; it acts as the key (our injection point).

For simplicity, just copy the request into a file and then run SQLmap using this command:

1
sqlmap -r request.sql -p username
-r - Load HTTP request from a file
-p - Testable parameter(s)

And you’re done!

Successfully Injected