Jump to content
Guest Praetorian

SQL Injection Challenge [Base]

Recommended Posts

Guest Praetorian

Info: Cu cateva zile in urma cineva mi-a dat sa fac sintaxa unui site vulnerabil la MySQLi, zicand ca nu poate obtine anumite date cu tools-uri / script-uri. Ce a urmat, a fost placut, pentru ca a fost prima data cand am intalnit un asemenea exemplu, si anume sa trebuiasca sa treci peste foarte multe filtre.

Vulnerable link: Traian Basescu

Proof: http://img413.imageshack.us/img413/9946/challengebase.png

Dificultate: Medium

Cerinte: Sa se foloseasca "union select", "concat() & group_concat()", vizualizarea tuturor tabelelor si coloanelor cu ajutorul "information_schema", "user(),database(),version()"

Syntaxele pe PM, iar ca proof lasati un screen editat.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...