A customer asked that we check out his intranet site, which was used by the company's employees and customers. This was part of a larger security review, and though we'd not actually used SQL injection to penetrate a network before, we were pretty familiar with the general concepts. We were completely successful in this engagement, and wanted to recount the steps taken as an illustration.
"SQL Injection" is subset of the an unverified/unsanitized user input vulnerability ("buffer overflows" are a different subset), and the idea is to convince the application to run SQL code that was not intended. If the application is creating SQL strings naively on the fly and then running them, it's straightforward to create some real surprises.
We'll note that this was a somewhat winding road with more than one wrong turn, and others with more experience will certainly have different -- and better -- approaches. But the fact that we were successful does suggest that we were not entirely misguided.
There have been other papers on SQL injection, including some that are much more detailed, but this one shows the rationale of discovery as much as the process of exploitation.
Pencarian
Blog Archive
-
▼
2009
(52)
-
▼
December
(52)
- 140 Amazing Hacks For your PC
- Ultra Hacker 155 in 1
- Full Hack Pack 2009 [Exclusive]
- Wifi Hacks 2009 AIO
- Wireless Hack Toolz 2009
- Dangerous Hack Tool 2010
- KingCripts Hacking Pack
- ESET Nod32 Keys Finder V7
- A.I.O USB Utilities Tools
- Hacking Tools - 85 in 1
- Metasploit Framework
- Network Spy 2.0
- "UU ITE Bermasalah di Penerapan"
- Tifatul: UU ITE Miliki Beberapa Kejanggalan
- Tutorial LAN Hacking (Newbie)
- Nessus
- Linux sock_sendpage
- Linux kernel 2.4/2.6
- Kernel 2.6.17
- Bug&dork New
- Meffy Scanner
- Albania Scanner
- Defacing malaysuck site
- Defacing malaysian site
- Rose Scanner
- About | MIRC
- Make Proxy From Shell
- Rafly Scanner
- Pittbull Scanner
- SQL Injection Attacks by Example
- Bug Dork PHPBB
- Bug Dork WordPress
- Bajo Sanner
- HACK WIFI
- Joomla Bugs
- Remote File Include (RFI)
- Hacker
- Zell Scanner
- Install Eggdrop
- Alb Scanner
- Italian Scanner
- The Best Hack Tools Collection Ever
- Feelcomz Scanner
- Defacing Indonesian Site
- Mamboleto Joomla! component Remote File Include Vu...
- Old Bug&Dork
- Old Bug-Dork
- Joomla Component com_jphoto SQL injection vulnerab...
- Bug&Dork
- Joomla Component MojoBlog Multiple Remote File Inc...
- Joomla Component com_jsjobs Multiple SQL injection
- Bug-Dork
-
▼
December
(52)
Labels
- Article (17)
- bug dork lfi (5)
- bug dork list (5)
- bug dork rfi (5)
- bug dork sql (5)
- bug dork timthumb (5)
- bug dork xml (5)
- Dork RFI (8)
- Exploit (5)
- Hacking Tools (52)
- Kill-9 News (14)
- lfi bug dork (5)
- Lfi Dork (3)
- LFI Scanner (5)
- Linux-Kernel (17)
- list bug (5)
- list bug dork (5)
- rfi bug dork (5)
- Rfi Scanner (17)
- SQLi (15)
- tutorial (36)
Statistic User
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment