Hi All,
In this tutorial we will try to bypass login form of vulnerable website using Mantra Security Toolkit
What all you need
1. Mantra Security Toolkit - Download
2. A vulnerable website. I'm using a modified version of LAMPSecurity CTF6
Let's begin,
Step 1:
I'm on the home page of the website now
![[Image: mantrasecuritytoolkit1.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_slpwrMT4vqzT_LbKJIhnL2PsXkNadNJvkOG6VdX9Ph6dhvHkRF6IZbmfB1_Y6u8ildwwYdNXdabVDag08ClYxZHBLTgbVHann_GctQjpxHoJ61eVClo9Ej9e_wTbn-DwA9gQdfE4LyDmQ9MlisHxRJXmzCrQqILxX7HPfZ6-dI-EtnpeoLf-MTl8rvTKKa-w5a-Q_w3YGL4NJxp3OARikNbP6R0doXnCWe0wPW=s0-d) Step 2:
Step 2:
Login form of the website
http://192.168.132.128/?action=login
![[Image: mantrasecuritytoolkit2.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_s1LHJDfmXirQtYVrIY7_ypLmtcG52UMO_nrwVSB7R5WwLipDmwBy25yBCJV6vR2_AvxnVwNtBJGy6-7SmDhb9YWzMtyB3uqkZYdhLQBbCzXKyXYzoHyelulJH-L7tC1fZnIbMj3z5vn7Y49jc_NAweMW5lrh0lajD8wFLtsZooc2BSGtpzrrWwAI1P-8hkrAa8aQ60OkpwU1_4Ti_ulp4A-7cxhuqBqyR5I3-c=s0-d) Step 3:
Step 3:
Now we will test the input forms against SQL injection. For that we can use SQL Inject Me tool. It can be launched from 
Tools > 
SQL Inject Me > 
Open SQL Inject Me Sidebar
![[Image: mantrasecuritytoolkit3.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vaPpmxvJ7EDf9VJam-MtIAvWQd5H7ZoxPVlIDFjXP9Btts1gwHEuDzaTh30OFSIigRPFt75BUhehYKjHEIp_oy88oxDwlRmPX_s5zCSwQ53YyXIEvybbzPccNtkwmeBI9ibPW3-aP6cxMAVbehSJ-rK7hJP2hmZT6Jh-E21UxO5exQIC1fXaXrw_Tm48NenGLrgTBCLfyjStjwzTbZRag_PvxMvjK32DRTaPfq=s0-d) Step 4:
Step 4:
You can see SQL Inject Me sidebar on the right
![[Image: mantrasecuritytoolkit4.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uHaejW9L4HWaNx6698lsDDhMzTaYp-_mOKTSFosxRQf-gCaZB9kCELsGVlIzLH8jTMg5u3lOk83-wxPUJXKBdr-drIspTmYitL3w4nufcQTdKb5vgsJyzktg1MIb8KJ-ki2K31HMIiCsHmKVOTmMLrJ9xOGqdpcQrsMwEr3xTC_M_XF05NcuacR4ZQzyZi_6u9UimSCBTujqoOz6s1IkvqZWwD0VaIZimbQM8=s0-d) Step 5:
Step 5:
I'm checking all the fields to test.
![[Image: mantrasecuritytoolkit5.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uEUcZR4f3dEi4ORpMaKHhW2szUaERMknheCsr8GQa6kAfmSVrjRzzCu0cLV5x5jV2mgjAg6Dr8nQh70Z1fK0kQszcT3OmIf2KPcoDyU9DyB6jaABunJCFV4271Y7HXHr7Ih0pe9D0vqDHE6ybOXs7XfBhj1RJhBtbRXnDje_TW1MSyryV7qePgJPiVyxos4EDamffO5baAIe1F1bSSP_YIMG4XRem8Ii1UtJE=s0-d) Step 6:
Step 6:
I clicked on "Test all forms with all attacks"
![[Image: mantrasecuritytoolkit6.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sByJAILbKMR9qdwL4AL25iUjSHD95pWsGenAcMs947jOywOrL9PcJvbE678NJfR1y-xT5s-2WUyRM4lO2xjYWjfS4XYPQyh3CRQR6U1cEoJx_qUlSU-tvVKLLWqQ-dZZmBDj4GEa7_nP3hKIXapC6cMGult5rblPdPRBpvrMrLkcHt-YnoLMcMIhT3OK2cHv0x-yPyjtjSXppqPyPaKabO7iSoTAfb-hJco_xF=s0-d) Step 7:
Step 7:
Test results says that none of the fields are vulnerable to SQL  injection attack. So its confirmed that the website is sanitizing the  input
![[Image: mantrasecuritytoolkit7.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sootgQg1PJXP_BtkM74CN8u4Ll6DeFsywb96hyUV1SCEaZpYyBgPLw5j94fDLXkkWctT41YP6exmyq7i6PZyYdvyH1h89T4lU8dya9MS0yTxMESB3Sdz4qpT9eOnei9zQw5vXRrpnPQ_hAn2P1fRMITU_Cpf3kLc_cgt9TJib0xp-7llMHQk2H56NMe_lakiaYz-SPN1oxQrSg6raIk-lCudd1JQ280ddTxyEL=s0-d) Step 8:
Step 8:
Now we will try to see what type of sanitizing mechanism the website is  employed. For that we will use Firebug. It can be launched by going to 
Tools > 
Firebug > 
Open Firebug
![[Image: mantrasecuritytoolkit9.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uRD0bVdGVBoocQjRz_QB6wr3UjbJj0RYG2Sy-o1h-6RYgA8XQyweuKgbxJi7B2hJvpgI9v5PLkzbiLgFa_WtVPUa7QN42jvJUBA5LDVByloNq_3ja3Xkzm9DvD4esEUlHPVVKFLzKk68fho5W6SA9JR-zW92oCVTslCpElxVGmMedyHlth1WkT5GH9rJ5rhewOSlw6k3sIC8sbWVyaxrO2oF3CbNZbwinCf8ny=s0-d) Step 9:
Step 9:
Now that firebug is open. I'm enabling Inspect mode of Firebug clicking on the inspect icon (second one) on the top left corner.
![[Image: mantrasecuritytoolkit10.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tSRm9BtML2rWI18f1nlqRiSOvUFJwYhNVbGCBqUL8TETfOF6ju0-fKE33s2gIOx7kgJIDkvhSnT9KPQumA_yfV0PZ4W6F3LnhtBmSVojdbJRmfuj-mRsfCRu9a4AB2ZgcmU1gwjAs1zIeEu_hRmNboYTXH8R4f4uStemHjOkeAF2-tJXwubZ5JPGBMQ5VErliKF9iTc5gGfdtVZHPdWSqVQ6gcOHatVadHBXdS7w=s0-d) Step 10:
Step 10:
I clicked on the login from and Firebug highlighted respective source  code. It shows that some type of local JavaScript is used to sanitize  the input.
![[Image: mantrasecuritytoolkit11.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vpJ5YS_togzOyFSxGHTi6frk2fLiM-p4mcfHC7HVNuhGL2P3IM9zwqUimd-q5aSNlyiFmn2CeD2tfexE4tlcN1Rt_2LzbPhD34bhG9PwSMXuczRBgCMRBL-RRsQ_klYTmkXOmgDKNFEHeNWM9cld7AZSmi0cV_-8n6v3NxHMytTvnEQgxyYjecSHvWM2fNkmym_z-7JxUthSP_PVEBh2b8HVcHODlOt4BZwU9X2w=s0-d) Step 11:
Step 11:
For bypassing it, we will use Live HTTP Headers. It can be launched either from sidebar or by going to 
Tools > 
Live HTTP Headers
![[Image: mantrasecuritytoolkit12.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v8f-6HDDX5HkAyDoi9S0d9O-OulLJdHebFUCx-ofQbpsQs7gEiVp8xZQte-0QB8BMCllq0FZ-qXHHEzBBNG-KAto6WwSO7sbkuHcYidXlASjDkUXX3TerLH3QFJpZ6dan0Cl6VI1WHZPNmOmReIYU1zpjEfoUlBdCva0I-Fuu9gizPppwxj0xsoozjCq6cKNhmK_-aVpqd1MNkggAjuNy-NIirI2uvaLdki0UWVw=s0-d) Step 12:
Step 12:
Now you can see Live HTTP Headers. The 
Capture check box must be checked.
![[Image: mantrasecuritytoolkit13.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sgPAVzdWolLp5vzN2Grpq-j3xK_TK0j5IV0ij4vucRnQM1pld6umG18f3lQwhiduegt_5rcBQhGntzxTkWiOftjDirNKPFPI9CFjkMfzvVC8ox1f93vYOQwzDohymoOLJYNRUNc6cAb7XPhwQYCleNJmAvwTGvk6ALWJyDoCER7TXe57XhTogJ6vGDPYy89T3bYv9KTEx7g7NJIjULCiq6TYf1OZP8ElYQMJw9RQ=s0-d) Step 13:
Step 13:
I went back to the login from and entered some sample values there and pressed on 
Log In
![[Image: mantrasecuritytoolkit14.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tmWVlTc8Ib2lNx9kC2gTECUg8pcjn31ODLqzR0clrMVAzV_ht0Im34DIncQpqCus5JZ4-JgM6ZpN5XonAYVmxJKms2G-fjQ-LlxlhlDHUBMJXlEjH-KBX1nAkwUNZwOdoFXnNbCcFo9uPjnu16syKeTN_105rXCID44aPBRxdBPu7oUA-KvEjNyUyQ6U5gmXiTpDy8OI4DJ3pkOa8YBmOC29vxUtNlO_AXmfdkvQ=s0-d) Step 14:
Step 14:
Now I again went back to Live HTTP Headers. We can clearly see that it captured the session.
![[Image: mantrasecuritytoolkit15.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sd4Lpm4WPUOZ8zbOubbzJGy4CrIDXmloL6CSO0Bb7vsruKlb3g3Ys8gSD2IBE6t6jRn3jcYiUqGmMgKlKvcjwBmcw4141vT5CJuPId9e4JPLyylghICtcVHACB1ahe0Uos44clI_CzYvZx07yzlDJjvws70c8rXN2jEIQYlFpkQYvCGVdTRiK4VyEnnAgRqkzuzZlVBWEI3_hEbydlBTmloyqXXSbQvuLh3R00UQ=s0-d) Step 15:
Step 15:
I scrolled it up to find the username, password data field. I clicked on it and pressed on 
Replay button
![[Image: mantrasecuritytoolkit16.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sJGWFTE0PR9f7rXh5vbZrwfEKFq_GTrr6ubPfp6m4V2RrGNvdesqcnKby7fQtJhYqTNMAERy1VPVzr5wib0RMY4IsR7374WRhNvRGNwgM3tU-YarbRmQ3WqofGBv3pV297TOaIbHnuYOR20OALlhKVzk0lZ4QxH-BCptaekAa_3Tc-_VHVc6xjLDCWWMfR_x3VEYzh_oZnwwjac-29FEPTohvtCvNPFvc4XKTRmg=s0-d) Step 16:
Step 16: 
I'm changing the value little bit to bypass the authentication and clicking on 
Replay button
![[Image: mantrasecuritytoolkit17.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uGKTgpGI9Kv1I6brDKHNXZ9WGdkUCNoEiKH708pQIKJFFcRB9_I6cgnKzhMAtJv0QRv-vDvPECl12OsFN-IPIKVCKNIwLiLaZ4egF_03dutFs5VmCJVJWMV5q8FxpsHjZJ90VdONYha-ihjuC3KENi_CISoGt_D8eX5C6VUdSj4jx6QxFCcQskXciRW-6UYbcG1nrfUK8HnTnbvN7p602F8PrW5MUTuKykqIB4pg=s0-d) Step 17:
Step 17:
hmmm. I got an error message. Looks like I should modify the injected code.
![[Image: mantrasecuritytoolkit18.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_txWUHH28zGX8IVhuasaEQjTTlVICplLGCCol7REJIyYaS12hkdbIPY57qfPOQJN1YlOxXkGpAZwY5KnI5CKD2kpEdwJE70ZTRs26AIV7QahfP2J1jAi4L0-bw4xLYXa6hiPsZNCdchsk4cKTBTuAAWtKoXid2RDjuG0vGi4KenjlWHZEwuTIbli1HGMAcqB3k5V3rNIsu-L9Ip07sZd6JfnfupGWWuqA6B9dPNKQ=s0-d) Step 18:
Step 18:
I modified the code
![[Image: mantrasecuritytoolkit19.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tWMH5KP5vO8Iplk-p73LbAeWqFK2HOO2rzXJErykhMDIRBjK_r18h60bLOjWW5g9GZCRHAXtkOzb9G-LZHD9xhHmjNti1ufY7Ezszo7nwyzjW7dxnH8zu_ojk4O0u1WdljNEHIw3moRKI63A5ntTBImEN1YAeE-7Bz3W-Wh-YbD-2xiW0D4SD1SwviswLPmnQJX0VoEl-ewMweeH1-y8KUgVGFkFupexd_EEmc1g=s0-d) Step 19:
Step 19:
No luck
![[Image: mantrasecuritytoolkit20.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tERvftqM9XogBV94x7cWlTPXr2mezh46BlJZybG900pUmw5s0MH6OpGK6CGHm4HXntm0B_P1_yjU-HjffxeqSv26F7ZTeCt4AXJzYXZCb-BQlQ81K9QdwzZq6rWUQ_tJCVhgRRC_1yWvdXfYWDKPsZsrqcSJ-1TkoqxZ_cT_lYHFNWPJnGBHqQDN6WXV31itEoXn-JwvIa5GW7GcWt3qDtCpU4yFpGHuVUBXCKGQ=s0-d) Step 18:
Step 18:
I changed the value again and pressed on 
Replay button
![[Image: mantrasecuritytoolkit21.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vbk2aCxFZQN8OUGxfJiu2bbuEe5SoPJNLB6lhz9WeHfPpe_frMzycWFPVF8nfFRt6GPSRww5fKN-b5Q4Z54V5p5st2iSH50r_2SqN3EquUAhw6sJ6MFR_f1azKhTfhbgljyp-zJZRsrhoRqDhX8doiDS5MMxs3VxkFhahMToqgB1ALevDrRr2NFksMqoqtoZfSGkI12ZjrT0eSIr1e5jhoktgruOtXC_YsG3JhpQ=s0-d) Step 19:
Step 19:
Voila. I'm successfully authenticated.
![[Image: mantrasecuritytoolkit22.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_szUKORmYJGrgYedsUJM1FMr76B5nVgiuifXtHtDmgxconMwHrq7JEd-eBE4JlU5r9wihHlDK9-kDI_Flxc-ufNZtHuiyzhCdfIJ8PNIgG53PKs9dKYchGPD9VMrUpj6bFGl96G5iofbsbnXOH_JWrBlDM3EHeU0yxedTr-EY2f_uazKTvmGegY5nj7Uv3o0f_gXiZIuTmk6aNyUU14BzeB9BoQpyKBWwyvzopKdA=s0-d) Step 20:
Step 20:
Now that I have got admin access
![[Image: mantrasecuritytoolkit23.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vcYUI3MiWWJVnZcz5yUfYhqa-VnR6UwzxMpYNs40UhrUhRTU3ctI5O1CV89vuoLwThySaE0p0n2mtVwjfWa-pDzC7_CmirKr3oh-i-8xYs3RBKEcq6CaT0wC3amKyOmftb8roc1wuXLHy9bAyzR3dtYZXnjcyRGbT1aKUYIw7dydWdF9ffERQm8iA2tx8WgbCIMzQsQls7dypGgaTcLTJ2mJJGoPXpHQBIoXWW-w=s0-d) 
If you wish to completely root the whole server, 
you can go to this post and follow steps from step 24