TIP: Click on subject to list as thread! ANSI
echo: osdebate
to: Ad
from: Ad
date: 2007-06-01 11:22:24
subject: Re: Pentest hack..

From: Ad 

ROFLMAO it has an appreciation site:

http://www.apostropheor1equals1dashdash.com/


Adam

Ad wrote:
> OK...we're deploying a webservice & esp wrt the recent fun & games wrt
> NHS systems up on't net & the security associated e.g.
>
> http://news.bbc.co.uk/1/hi/uk_politics/6594111.stm
>
> "The Department of Health has apologised for an apparent security lapse
> which allowed the personal details of junior doctors to be accessed online.
>
> Channel 4 News reported that a breach on the NHS Medical Training
> Application Service website allowed public access for at least eight hours.
>
> The department said the details had only been available briefly, and
> only to people making employment checks.
>
> Shadow health secretary Andrew Lansley said it was shocking and
> unacceptable.
>
> On Wednesday, Channel 4 News reported that a doctor had alerted them to
> a security breach allowing confidential details to be accessed. "
>
> So we're having our systems comprehensively pentested prior to public
> availability
>
> anyway...
>
> neat SQL injection
>
> imagine a system which is eval'ing a user against a db using SQL
>
> std 1st line of SQL = "Select * from tableX where fieldA ='"
>
> e.g. tableX = "user" & fieldA = userID but it doesn't
really matter as
> the system is basically looking for a boolean & if true let him in &
> give him a sessionId.....
>
> So.....fieldA value posted in form the webform =
>
>  ' or 1=1 --
>
>
>
> Neat.
>
>
> Adam

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267
@PATH: 379/45 1 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.