![]() |
SQL injection tutorial - Printable Version +- Sinisterly (https://sinister.ly) +-- Forum: Hacking (https://sinister.ly/Forum-Hacking) +--- Forum: Website & Server Hacking (https://sinister.ly/Forum-Website-Server-Hacking) +--- Thread: SQL injection tutorial (/Thread-SQL-injection-tutorial--40790) Pages:
1
2
|
RE: SQL injection tutorial - A.W.H - 01-19-2013 Thank you for sharing. Nice and simple to comprehend; the best kind of tutorial. RE: SQL injection tutorial - LEGITimacy™ - 01-21-2013 (04-22-2012, 10:52 AM)grouver08 Wrote: 1:admin:$P$BVn6ffoysMZIZWl..WeFguFFjfG8rX0:loschi@studioaltermedia.it Yes there is a way to decrypt the hashes. They are Md5 wordpress hashes which tend to be rather tricky to crack. The algorithm is pretty hard to crack and takes a long time, also might want to make sure if they contain salts. Look into using hashcat if you want to crack them. As for OP nice TUT, but you could have also explained WAF Bypassing. Sometimes Union Select and other commands are blocked by Windows Application Firewall (WAF) so you would have to trick the application into not detecting the union select command by either commenting or white spaces, like so /**UNION**/+/**SELECT**/+1,2,3... |