Waraxe IT Security Portal
Login or Register
November 16, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 76
Members: 0
Total: 76
Full disclosure
SEC Consult SA-20241112-0 :: Multiple vulnerabilities in Siemens Energy Omnivise T3000 (CVE-2024-38876, CVE-2024-38877, CVE-2024-38878, CVE-2024-38879)
Security issue in the TX Text Control .NET Server for ASP.NET.
SEC Consult SA-20241107-0 :: Multiple Vulnerabilities in HASOMED Elefant and Elefant Software Updater
Unsafe eval() in TestRail CLI
4 vulnerabilities in ibmsecurity
32 vulnerabilities in IBM Security Verify Access
xlibre Xnest security advisory & bugfix releases
APPLE-SA-10-29-2024-1 Safari 18.1
SEC Consult SA-20241030-0 :: Query Filter Injection in Ping Identity PingIDM (formerly known as ForgeRock Identity Management) (CVE-2024-23600)
SEC Consult SA-20241023-0 :: Authenticated Remote Code Execution in Multiple Xerox printers (CVE-2024-6333)
APPLE-SA-10-28-2024-8 visionOS 2.1
APPLE-SA-10-28-2024-7 tvOS 18.1
APPLE-SA-10-28-2024-6 watchOS 11.1
APPLE-SA-10-28-2024-5 macOS Ventura 13.7.1
APPLE-SA-10-28-2024-4 macOS Sonoma 14.7.1
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> Newbies corner -> Best way?
Post new topicReply to topic View previous topic :: View next topic
Best way?
PostPosted: Fri Mar 25, 2005 8:11 pm Reply with quote
700G
Active user
Active user
Joined: Mar 25, 2005
Posts: 33




Hello all, I'm new to the forum. Can anyone point me in the irght direction as to get around this?:

Code:
<form action="default.asp" method="POST" name="TheForm" ID="TheForm">



<h2>Please log in below:</h2>

<p>

<table cellspacing=2 cellpadding=5>
<tr valign=top><td align=right class="LargeHead">User ID:</td>

<td align=left bgcolor="#CBD0DF"><input type="text" name="UserID" ID="UserID" size="15" maxlength="15" value=""></td></tr>

<tr valign=top><td align=right class="LargeHead">Password:</td>

<td align=left bgcolor="#CBD0DF"><input type="password" name="Password" ID="Password" size="15" maxlength="15"></td></tr>

<script type='text/javascript'>
<!--
document.TheForm.UserID.focus();
document.TheForm.UserID.select();
//-->
</script>

<tr><td colspan=2 align=right>
<input type="submit" value="Log In">
</td></tr>
</table>

</p>

<INPUT TYPE="Checkbox" name="SaveLogin">Save Login As Cookie? <a href="javascript:Start('cookies.htm');" class="smallLink">What does this mean?</a>


</form>


Very Happy
View user's profile Send private message
PostPosted: Fri Mar 25, 2005 9:28 pm Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




You can try possible sql injection or xss in this login script, but in most cases login fragments are securely written. I suggest to search for sql injections from all other asp scripts too, because often webmasters and programmers are too lazy to code securely Laughing
And IF you can do sql injection and IF this asp powered site is built on MSSQL, then you are one step away from getting all the usernames and passwords at website Smile
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Mon Mar 28, 2005 4:35 am Reply with quote
700G
Active user
Active user
Joined: Mar 25, 2005
Posts: 33




Thank for the info Waraxe Very Happy
View user's profile Send private message
PostPosted: Mon Mar 28, 2005 1:45 pm Reply with quote
y3dips
Valuable expert
Valuable expert
Joined: Feb 25, 2005
Posts: 281
Location: Indonesia




waraxe wrote:
You can try possible sql injection or xss in this login script, but in most cases login fragments are securely written. I suggest to search for sql injections from all other asp scripts too, because often webmasters and programmers are too lazy to code securely Laughing
And IF you can do sql injection and IF this asp powered site is built on MSSQL, then you are one step away from getting all the usernames and passwords at website Smile


i forgot about this after answering your comment
so i have to askig u about your project call "sqlaxe" ?
what project is that ?
could u give some explain ?

_________________
IO::y3dips->new(http://clog.ammar.web.id);
View user's profile Send private message Visit poster's website Yahoo Messenger
PostPosted: Mon Mar 28, 2005 7:13 pm Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




y3dips wrote:
waraxe wrote:
You can try possible sql injection or xss in this login script, but in most cases login fragments are securely written. I suggest to search for sql injections from all other asp scripts too, because often webmasters and programmers are too lazy to code securely Laughing
And IF you can do sql injection and IF this asp powered site is built on MSSQL, then you are one step away from getting all the usernames and passwords at website Smile


i forgot about this after answering your comment
so i have to askig u about your project call "sqlaxe" ?
what project is that ?
could u give some explain ?


SqlAxe - it's project, i've started allready some time ago and still there is much to do till first public alpha release will be out. SqlAxe is pentester tool, useful for sql injection exploiting. It will handle Oracle, MySql, MsSql, Access and PostgreSql databases, it can exploit blind and half-blind injections, etc...
SqlAxe will be written in visual c++ for win32 platform. Maybe i will release some opensource version too - in Perl language for example. But first i want to test many things before going public Smile
There is more programs, i want to develope in near future, for example BiosAxe - Win32 utility for Bios/CMOS password resetting and bruteforcing. I know, there are many progs with same functionality, but BiosAxe will work on WinXP (admin privilegedes needed of course) and no command line knowledge needed for using Wink
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Tue Mar 29, 2005 3:04 am Reply with quote
y3dips
Valuable expert
Valuable expert
Joined: Feb 25, 2005
Posts: 281
Location: Indonesia




waraxe wrote:

SqlAxe - it's project, i've started allready some time ago and still there is much to do till first public alpha release will be out. SqlAxe is pentester tool, useful for sql injection exploiting. It will handle Oracle, MySql, MsSql, Access and PostgreSql databases, it can exploit blind and half-blind injections, etc...
SqlAxe will be written in visual c++ for win32 platform. Maybe i will release some opensource version too - in Perl language for example. But first i want to test many things before going public Smile
There is more programs, i want to develope in near future, for example BiosAxe - Win32 utility for Bios/CMOS password resetting and bruteforcing. I know, there are many progs with same functionality, but BiosAxe will work on WinXP (admin privilegedes needed of course) and no command line knowledge needed for using Wink


hum, interesting,
may i have the perl source ?
maybe i can combine it with my project or some refference for me Rolling Eyes Wink
or u publish the alpha or beta version so we can help u to tested it

_________________
IO::y3dips->new(http://clog.ammar.web.id);
View user's profile Send private message Visit poster's website Yahoo Messenger
PostPosted: Tue Mar 29, 2005 8:52 pm Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




y3dips wrote:
waraxe wrote:

SqlAxe - it's project, i've started allready some time ago and still there is much to do till first public alpha release will be out. SqlAxe is pentester tool, useful for sql injection exploiting. It will handle Oracle, MySql, MsSql, Access and PostgreSql databases, it can exploit blind and half-blind injections, etc...
SqlAxe will be written in visual c++ for win32 platform. Maybe i will release some opensource version too - in Perl language for example. But first i want to test many things before going public Smile
There is more programs, i want to develope in near future, for example BiosAxe - Win32 utility for Bios/CMOS password resetting and bruteforcing. I know, there are many progs with same functionality, but BiosAxe will work on WinXP (admin privilegedes needed of course) and no command line knowledge needed for using Wink


hum, interesting,
may i have the perl source ?
maybe i can combine it with my project or some refference for me Rolling Eyes Wink
or u publish the alpha or beta version so we can help u to tested it


Well, will see...
First of all, i must put some really hard work to sqlaxe project, because right now its in very early stage. And then it will be interesting to share further ideas about improvements, etc ...
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Wed Mar 30, 2005 1:03 pm Reply with quote
y3dips
Valuable expert
Valuable expert
Joined: Feb 25, 2005
Posts: 281
Location: Indonesia




waraxe wrote:

Well, will see...
First of all, i must put some really hard work to sqlaxe project, because right now its in very early stage. And then it will be interesting to share further ideas about improvements, etc ...


im waiting Smile

_________________
IO::y3dips->new(http://clog.ammar.web.id);
View user's profile Send private message Visit poster's website Yahoo Messenger
Best way?
www.waraxe.us Forum Index -> Newbies corner
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 1 of 1

Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.047 Seconds