Active Members dancezar Posted February 26, 2014 Active Members Report Share Posted February 26, 2014 (edited) TargeT : http://danyweb-challenge.host56.com/Misiunea este simpla gasiti o vurnerabilitate nu conteaza ce,exploatati-o si scrieti-va numele pe index.Am introdus doua inregistrari pe index ca sa fac niste teste.Reguli:-Nu divulgati numele vurnerabilitati pe care ati gasit-o sau cuvinte care ar avea legatura cu aceasta-Trimiteti-mi pe pm rezolvarea-Postati un post cu poza numelui tau de pe index (doar index-ul nu altceva), in thread-ul acesta ca sa dovedesti ca numele de pe index este al tau.-Nu dati alte hinturiSolveri:-askwrite Edited February 27, 2014 by danyweb09 Quote Link to comment Share on other sites More sharing options...
Bit-ul Posted February 26, 2014 Report Share Posted February 26, 2014 Filtrezi vreun caracter? Quote Link to comment Share on other sites More sharing options...
Shelo Posted February 26, 2014 Report Share Posted February 26, 2014 (edited) Asa challange-uri mai zic si eu// cam 0 hinturi incerc sa-mi dau seama singurel dar incearca sa lasi un HINT Edited February 26, 2014 by Shelo Quote Link to comment Share on other sites More sharing options...
coolbyte Posted February 26, 2014 Report Share Posted February 26, 2014 Agasit careva ceva ca eu vad pur si simplu un html si ata Quote Link to comment Share on other sites More sharing options...
Bit-ul Posted February 26, 2014 Report Share Posted February 26, 2014 Asa challange-uri mai zic si eu// cam 0 hinturi incerc sa-mi dau seama singurel dar incearca sa lasi un HINTMarele hacker Shelo nu gaseste vulnerabilitatea? Vai... Nu merge acunetixu? Quote Link to comment Share on other sites More sharing options...
Shelo Posted February 26, 2014 Report Share Posted February 26, 2014 Marele hacker Shelo nu gaseste vulnerabilitatea? Vai... Nu merge acunetixu? Am spus eu ca am incercat ? Daca ai gasito tu asta nu inseamna ca trebuie sa gaseasca toti. Dar vad ca nu ai gasito nici tu ca nu-ti vad numele pe acolo. Quote Link to comment Share on other sites More sharing options...
Active Members dancezar Posted February 27, 2014 Author Active Members Report Share Posted February 27, 2014 Hint 1: O imagine face cat 100 de cuvinte.Hint 2: Folosesc baza de date.Daca v-ati prins , be quiet. Quote Link to comment Share on other sites More sharing options...
yoyois Posted February 27, 2014 Report Share Posted February 27, 2014 (edited) //removeWTF? Nu ma prind inca ce se intampla acolo Edited February 27, 2014 by yoyois Quote Link to comment Share on other sites More sharing options...
Shelo Posted February 27, 2014 Report Share Posted February 27, 2014 E foarte usor de gasit vulnersbilitatea, de exploatat e mai greu, mai incerc..De gasit am gasito si eu. Quote Link to comment Share on other sites More sharing options...
Dark_4ngel Posted February 27, 2014 Report Share Posted February 27, 2014 m-am lasat batut astept rezolvare ca e dat dracu' challenge-ul asta !! bravo @danyweb09 Quote Link to comment Share on other sites More sharing options...
Active Members dancezar Posted February 27, 2014 Author Active Members Report Share Posted February 27, 2014 Tui rasa mamei lui de chall prost, cati nervi mi-a consumat, mai ales la scris numele pe index si era asa simplu, dispari dany!Baaa vezi ca iti sterg numele:))))Bravo.Challenge deschis pana duminica la ora 11:00 cand il voi inchide si voi posta rezolvarea. Quote Link to comment Share on other sites More sharing options...
Active Members dancezar Posted March 2, 2014 Author Active Members Report Share Posted March 2, 2014 (edited) Challenge.close()Rezolvarea se afla aici.La sqli nu s-au gandit decat 3-4 persoane. Pentru cei care vor sa il incerce aici aveti arhiva cu scriptul:https://www.mediafire.com/?aqizkdm2tm1yddySetati datele de conectare la DB in index.php,admin.php si /image/index.php apoi executati fiserul sql in phpmyadminSintaxa folosita: ",(select count("ceva") from(select 1 union select 2 union select 3)x group by concat((select @@version),floor(rand(0)^2)))#Cu %a0 in loc de spatii Edited March 2, 2014 by danyweb09 Quote Link to comment Share on other sites More sharing options...