본문 바로가기

모의해킹 (WAPT)193

728x90
Testing for Directory Traversal Black Box testing and example (a) Input Vectors Enumeration In order to determine which part of the application is vulnerable to input validation bypassing, the tester needs to enumerate all parts of the application which accept content from the user. This also includes HTTP GET and POST queries and common options like file uploads and HTML forms. Here are some examples of the checks to be perfo.. 2010. 6. 1.
SQL Injection and Signature Evasion SQL-Injection: Attack-Types 2010. 5. 31.
sqlninja - a SQL Server injection & takeover tool Sqlninja's goal is to exploit SQL injection vulnerabilities on web applications that use Microsoft SQL Server as back end. It is released under the GPLv2. There are a lot of other SQL injection tools out there but sqlninja, instead of extracting the data, focuses on getting an interactive shell on the remote DB server and using it as a foothold in the target network. In a nutshell, here's what i.. 2010. 5. 25.
Remote file include in appserv 2.4.5 ====================================================================== Remote file include in appserv 2.4.5 (possible in previous versions) ====================================================================== [ What is Appserv ] AppServ is the Apache/PHP/MySQL open source software installer packages. Objective : - Easy to buid Webserver and Database Server - For those who just beginning client.. 2010. 5. 14.
PHP 인젝션 기본구문 이해 1. 삽입 위치 확인 and 1=1 (정상, 이전 페이지와 동일) and 1-2 (오류가 아닌 이전 페이지와 같음) 2. union 쿼리 수행 여부 결정 and ord(mid(version(),1,1))>51 (4.0이상 가능, 3.0 51 이상) 3. order by 사용 스톰 필드 order by 숫자 (오류 5, 정상 4) 4. union 사용 정확한 필드 쿼리 and 1=2 union select 1,2,3,....... (정확한 숫자 추측) 5. 데이터베이스 쓰기권한 계정 확인 (root권한) and (select count(*) from mysql.user)>0 (오류는 관리자 계정 암호 추측에 사용) - load_file(char(파일경로ascii값 쉼표로 분리 또는 16진수 사용)) 기능으.. 2010. 5. 13.
728x90
728x90