|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
Question UNION... 1,2,3,4,5 |
|
Posted: Wed Mar 15, 2006 8:05 am |
|
|
panzerstar |
Beginner |
|
|
Joined: Mar 15, 2006 |
Posts: 2 |
|
|
|
|
|
|
|
Hello,
Here http://www.waraxe.us/advisory-47.html I've found this:
http://localhost/nuke78/?kala=p0hh+UNION+ALL+SELECT+1,2,3,pwd,5+FROM+nuke_authors/%2a
I cannot understand why or what happens when you enter 1,2,3,4,5 or even 1,2,3,pwd,5 instead of * or ascii. I think realnames arent called like this.
A small example to following what happens would be very nice.
Thank you for spending time to answer my question
greetings panzer |
|
|
|
|
Posted: Fri Mar 17, 2006 3:05 am |
|
|
panzerstar |
Beginner |
|
|
Joined: Mar 15, 2006 |
Posts: 2 |
|
|
|
|
|
|
|
Re,
Nobody can help? Here is an additional part, sometimes the 1's are replaces with 0's, why?
greetings |
|
|
|
|
Posted: Thu Mar 23, 2006 10:12 am |
|
|
Classics |
Regular user |
|
|
Joined: Mar 23, 2006 |
Posts: 6 |
Location: Nederland/Venlo |
|
|
|
|
|
|
to make this request in the Search field... of vuln Page!
as a result of MD5 Hash
greetz |
|
|
|
|
Posted: Mon Apr 24, 2006 2:42 pm |
|
|
Slodave |
Beginner |
|
|
Joined: Apr 20, 2006 |
Posts: 3 |
|
|
|
|
|
|
|
Using 1,2,3 is only way to execute UNION statement because union all need's to have same fields as select statement (if you use * it seclect all). Using numbers is good because you don't need to wory about field type.
Hope it helps. |
|
|
|
|
|
|
|
|
Posted: Fri Apr 28, 2006 11:27 am |
|
|
waraxe |
Site admin |
|
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
|
|
|
|
There are many reasons and any pentester or software security auditor has some personalized habbits in sql injection testing and exploiting area.
Yep, the classical UNION exploiting scheme --> "count of columns does not match", and when it will finally will match, then all the fields must be same type. Sql injection whitepapers suggest to use "UNION ALL SELECT null,null", but if we use "UNION ALL SELECT 1,2,3,4,5,6,7", then we can see by feedback, what sql fields are rendered in what position in html code. So it is faster than "null, null, null" and then "1,null,null" and then "null, 2, null" etc.
Of course, there can be many problems in real life exploiting.
One example:
Code: |
http://www.ra***ar.ee/index.php?lang=pp"%20UNION%20ALL
%20SELECT%201,2,3,@@version,5,6,7,8,9,10,11,12,13,14,15,
16,17,18,19,20/*
|
and we get
Code: |
Illegal mix of collations (latin1_swedish_ci,IMPLICIT) and (utf8_general_ci,COERCIBLE) for operation 'UNION'
|
Heh, of course this problem can be solved, but this is the real life - you must be creative and learn new methods all the time |
|
|
|
|
|
www.waraxe.us Forum Index -> Sql injection
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|