Jump to content
malsploit

Exploatare sqli

Recommended Posts

Posted

Am dat peste o comunitate online relativ mare care are site-ul vulnerabil la sqli(cred).

Daca pun un ' in query imi apare un element textarea cu:

 	SELECT 	a.*, 
MATCH(b.pagetext) AGAINST('+\ \ \' IN BOOLEAN MODE) as score
FROM post_summary AS b
LEFT JOIN thread AS a ON b.threadid=a.threadid
WHERE
( a.forumid=101 OR a.forumid=3 OR a.forumid=303 OR a.forumid=238 OR a.forumid=248 OR a.forumid=249 OR a.forumid=251 OR a.forumid=252 OR a.forumid=255 OR a.forumid=264 OR a.forumid=300 OR a.forumid=305 OR a.forumid=304 OR a.forumid=302 OR a.forumid=301 OR a.forumid=309 OR a.forumid=312 OR a.forumid=311 OR a.forumid=308 OR a.forumid=310 OR a.forumid=317 OR a.forumid=315 OR a.forumid=323 )
AND a.bumpdate>1291714180
AND a.visible=1
AND MATCH(b.pagetext) AGAINST('+\ \ \' IN BOOLEAN MODE)





GROUP BY a.threadid
ORDER BY a.bumpdate desc,a.forumid
LIMIT 0, 20

am increcat sa exploatez sqli manual dar nu a mers(de fapt nu am putut).

Cateva sugesti?

@off Daca tot umblati la forum puneti si un searchbox in homepage

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...