Penetration Testing mailing list archives
Re: tool recommendations and sql injection help
From: "Mike Klingler" <whitehatguru () gmail com>
Date: Sat, 29 Jul 2006 14:46:01 -0500
Travis, When attempting SQL injections against a website there are some steps that can help to get data. The first think that I like to do is to get an added string that will show the page properly. I would copy the query string for the page that worked properly and add stuff to that. If page were show.asp?newsid=2 I would try to see if it displayed properly with these query show.asp?newsid=2' AND '1'=='1 If that gave the same page back without any errors that means that you have found the "YES" page. Next I would try show.asp?newsid=2' AND '1'=='0 If that gave a page with blank result where content would be that means you have found your "NO" page. The NO page is good to have becuase it allows you to confirm that the syntax of the query was processed properly. Lacking a "NO" page it is hard to be sure if your syntax is messed up or not. Once you can get a YES and NO and an error page you should be able to execute any SQL command against the server within the scope of the users priveledges unless they have some input validation and checking. However, that is an entirely different conversation. On 7/27/06, Travis <teedubb () gmail com> wrote:
i am performing an external scan for a company. i have already ran nessus and nikto. neither one of these turned up any major vulnearabilities other than a possible sql injection, seen below. --------------------------------------------------------------------------- Microsoft JET Database Engine error '80040e14' Syntax error in string in query expression 'NewsID=''. /news-article.asp, line 15 ---------------------------------------------------------------------------- nessus gave the following vulnerability message ---------------------------------------------------------------------------- The following URLs seem to be vulnerable to various SQL injection techniques : /news-article.asp?NewsID='UNION' /news-article.asp?NewsID=' /news-article.asp?NewsID=' /news-article.asp?NewsID='%22 /news-article.asp?NewsID='%22 /news-article.asp?NewsID=9%2c+9%2c+9 /news-article.asp?NewsID=9%2c+9%2c+9 /news-article.asp?NewsID='bad_bad_value /news-article.asp?NewsID='bad_bad_value /news-article.asp?NewsID=bad_bad_value' /news-article.asp?NewsID=bad_bad_value' /news-article.asp?NewsID='+OR+' /news-article.asp?NewsID='WHERE /news-article.asp?NewsID='WHERE /news-article.asp?NewsID=%3B /news-article.asp?NewsID=%3B /news-article.asp?NewsID='OR /news-article.asp?NewsID='OR ------------------------------------------------------------------- when i report this vulnearability to the company i want to show evidence of data that i got from the injection. i have read white papers on sql injections and i have tried all the usual suspects when it comes to sql injections but still no luck. is there something special with Microsoft JET database? what would be some sql injections i could try to pull back table information? i have tried an automated too such as Absinthe, not sure how to use it though. what is your take on commercial software that scans (e.g. webinspect, saint), should i give those a shot as well or will nessus do the trick? ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ------------------------------------------------------------------------------
-- Michael Klingler, CISSP SecurityMetrics Penetration Tester ------------------------------------------------------------------------------ This List Sponsored by: CenzicConcerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------
Current thread:
- tool recommendations and sql injection help Travis (Jul 27)
- Re: tool recommendations and sql injection help Mike Klingler (Jul 29)
- RE: tool recommendations and sql injection help Carl Davis (Jul 30)