From: Mike Klingler (whitehatguru@gmail.com)
Date: Sat Jul 29 2006 - 15:46:01 EDT
Travis,
When attempting SQL injections against a website there are some steps
that can help to get data. The first think that I like to do is to
get an added string that will show the page properly. I would copy
the query string for the page that worked properly and add stuff to
that.
If page were show.asp?newsid=2
I would try to see if it displayed properly with these query
show.asp?newsid=2' AND '1'=='1
If that gave the same page back without any errors that means that you
have found the "YES" page.
Next I would try
show.asp?newsid=2' AND '1'=='0
If that gave a page with blank result where content would be that
means you have found your "NO" page. The NO page is good to have
becuase it allows you to confirm that the syntax of the query was
processed properly. Lacking a "NO" page it is hard to be sure if your
syntax is messed up or not.
Once you can get a YES and NO and an error page you should be able to
execute any SQL command against the server within the scope of the
users priveledges unless they have some input validation and checking.
However, that is an entirely different conversation.
On 7/27/06, Travis <teedubb@gmail.com> wrote:
> i am performing an external scan for a company. i have already ran
> nessus and nikto. neither one of these turned up any major
> vulnearabilities other than a possible sql injection, seen below.
>
> ---------------------------------------------------------------------------
>
> Microsoft JET Database Engine error '80040e14'
>
> Syntax error in string in query expression 'NewsID=''.
>
> /news-article.asp, line 15
>
> ----------------------------------------------------------------------------
>
> nessus gave the following vulnerability message
>
> ----------------------------------------------------------------------------
>
> The following URLs seem to be vulnerable to various SQL injection
> techniques :
>
> /news-article.asp?NewsID='UNION'
> /news-article.asp?NewsID='
> /news-article.asp?NewsID='
> /news-article.asp?NewsID='%22
> /news-article.asp?NewsID='%22
> /news-article.asp?NewsID=9%2c+9%2c+9
> /news-article.asp?NewsID=9%2c+9%2c+9
> /news-article.asp?NewsID='bad_bad_value
> /news-article.asp?NewsID='bad_bad_value
> /news-article.asp?NewsID=bad_bad_value'
> /news-article.asp?NewsID=bad_bad_value'
> /news-article.asp?NewsID='+OR+'
> /news-article.asp?NewsID='WHERE
> /news-article.asp?NewsID='WHERE
> /news-article.asp?NewsID=%3B
> /news-article.asp?NewsID=%3B
> /news-article.asp?NewsID='OR
> /news-article.asp?NewsID='OR
>
> -------------------------------------------------------------------
>
> when i report this vulnearability to the company i want to show
> evidence of data that i got from the injection. i have read white
> papers on sql injections and i have tried all the usual suspects when
> it comes to sql injections but still no luck. is there something
> special with Microsoft JET database? what would be some sql
> injections i could try to pull back table information? i have tried
> an automated too such as Absinthe, not sure how to use it though.
>
> what is your take on commercial software that scans (e.g. webinspect,
> saint), should i give those a shot as well or will nessus do the
> trick?
>
> ------------------------------------------------------------------------------
> This List Sponsored by: Cenzic
>
> Concerned about Web Application Security?
> Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
> Choice Award from eWeek. As attacks through web applications continue to rise,
> you need to proactively protect your applications from hackers. Cenzic has the
> most comprehensive solutions to meet your application security penetration
> testing and vulnerability management needs. You have an option to go with a
> managed service (Cenzic ClickToSecure) or an enterprise software
> (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
> help you: http://www.cenzic.com/news_events/wpappsec.php
> And, now for a limited time we can do a FREE audit for you to confirm your
> results from other product. Contact us at request@cenzic.com for details.
> ------------------------------------------------------------------------------
>
>
-- Michael Klingler, CISSP SecurityMetrics Penetration Tester ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request@cenzic.com for details. ------------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:56:27 EDT