|
|
|
|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 136
Members: 0
Total: 136
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
SQL injection Help |
|
Posted: Tue Mar 25, 2008 11:49 am |
|
|
w0rm |
Active user |
|
|
Joined: Feb 22, 2008 |
Posts: 49 |
|
|
|
|
|
|
|
Hi , ineed help fot this exploit !
Code: | page.php?id=36+order+by+1 |
No error
Code: | page.php?id=36+order+by+24 |
No error
Code: | page.php?id=36+order+by+25 |
error mysql ...
Code: | Warning: mysql_num_rows(): supplied argument is not a valid MySQL result resource in /home/site/page.php on line 116 |
i try with union select witch [1,2,3 & @@version,@@versio,.. ], but always i get error , so , waraxe if u have a answer plz ! and thkx |
|
|
|
|
Posted: Tue Mar 25, 2008 12:45 pm |
|
|
waraxe |
Site admin |
|
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
|
|
|
|
You are doing things in wrong order.
First task is to determine sql injection presence - with single quote or without. Next - you must get syntax right and determine need for possible commenting out. And third step is getting UNION columns count right. But it seems to me that you always start with third step and try to bypass first tests. |
|
|
|
|
www.waraxe.us Forum Index -> Sql injection
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|