It’s a Java SpringBoot application that primarily focuses on code review, identifying SQLi vulnerabilities in the code, and demonstrating advanced SQL injection techniques. It's worth noting that they were developed as part of the HackTheBox Academy's Advanced SQL Injections module.
java -jar BlueBird-0.0.1-SNAPSHOT.jarNote that the PostgreSQL database source file is: bluebird_backup.sql
spring.datasource.url= jdbc:postgresql://localhost:5432/bluebird
spring.datasource.username= bbuser
spring.datasource.password= bbpasswordUse any of the techniques to exploit this SQL injection vulnerability on the target over port 8080. What is the password hash of the user whose email is Amy.Mcwilliams@proton.me?
Take a look at how the password-reset links are generated in forgotPOST(). Use the error-based SQLi to dump the required information on the target over port 8080, and enter what the value of 'passwordResetLink' for the user 'potus4' would be.
Exploit the second-order SQL injection in BlueBird on the target over port 8080. What is the password hash of 'betrayedApples3'?
Hope my thoughts give you some tips:
/skill assessment/