|
|
|
|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 42
Members: 0
Total: 42
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
|
hi there,
im new here nice to meet you all.
im looking for someone who has alot of skills in xss or sql injection and finding vulnerabilities exploit etc etc.
its for some project im working o ... |
|
|
|
|
mysql_result() could be secured if GET parameter was casted to int, therefore will just use the numeric part and strip off anything else.. which is a bad news for you.
To make a test, Try this:
... |
|
|
|
|
If the 'SELECT' keyword filtered ..Then it can be avoided by using a lot of techniques, Try this with simple queries ..
Vuln.php?ID=1/*--*/UNION/*--*/SELECT/*--*/1,2,3..
Vuln.php?ID=1+UNION+/*!SE ... |
|
|
|
|
linux hash??
$1$60$axDH68Y/O5t0/AWSbEl4b0
$1$06$tG6v0.5RB62p2k8s6tNeV1
$1$64$AAQjUzDHVJnceSCc8VcQR1
Did you get them from /etc/shadow? If yes, In this case the has ... |
|
|
Page 1 of 1 |
All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|