Nytro Posted April 6, 2011 Report Posted April 6, 2011 Advanced MySQL Exploitationby Muhaimin DzulfakarContents1 Abstract...........................................................................................................................................32 Introduction ...................................................................................................................................33 Stacked Query................................................................................................................................34 Attacking MySQL on applications that do support stacked queries...............................................45 Attacking MySQL on applications that do not support stacked queries........................................56 Fingerprinting the web server directory.........................................................................................76.1 Fingerprint through error message method................................................................................76.2 Fingerprint through LOAD_FILE method......................................................................................77 Maximum size of arbitrary code allowed........................................................................................78 Arbitrary file compression/decompression ....................................................................................89 Dealing with columns......................................................................................................................810 Remote code execution on LAMP.................................................................................................911 Remote code execution on WAMP.............................................................................................10References .......................................................................................................................................11Download:http://dl.packetstormsecurity.net/papers/database/mysql-exploitation.pdf Quote