TIP: Click on subject to list as thread! ANSI
echo: osdebate
to: Ad
from: Antti Kurenniemi
date: 2007-06-01 20:20:58
subject: Re: Pentest hack..

From: "Antti Kurenniemi" 

"Ad"  wrote in
message news:465ff278$1{at}w3.nls.net...
> neat SQL injection
>
> imagine a system which is eval'ing a user against a db using SQL
>
> std 1st line of SQL = "Select * from tableX where fieldA ='"
>
> e.g. tableX = "user" & fieldA = userID but it doesn't
really matter as the
> system is basically looking for a boolean & if true let him in
& give him
> a sessionId.....
>
> So.....fieldA value posted in form the webform =
>
>  ' or 1=1 --
>
> Neat.

That's an old trick. But the good news is, you can spice it up a bit, for
example: ' or 1=1; drop tableX;'. Don't laugh, it actually works some
times.


Antti Kurenniemi
(not on my watch, but I've seen some really, really dangerous code...)

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267
@PATH: 379/45 1 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.