• 🌙 Community Spirit

    Ramadan Mubarak! To honor this month, Crax has paused NSFW categories. Wishing you peace and growth!

SQLi/Dork Blind SQL injection.... (1 Viewer)

Currently reading:
 SQLi/Dork Blind SQL injection.... (1 Viewer)

Recently searched:

Tsubodai333

Member
LV
1
Joined
Dec 19, 2022
Threads
10
Likes
7
Awards
4
Credits
2,007©
Cash
0$
Blind SQL injection is clone of normal SQL Injection except that when an attacker attempts to use an application, instead of getting a useful error message, they get a generic page specified by the developer instead. This makes exploiting a possible SQL Injection attack harder but not impossible. An attacker can still steal data by asking a series of True and False questions through SQL statements. The attacker provides your database application with some malformed data, and your application uses that data to create a SQL statement using string concatenation. This allows the attacker to vary the semantics of the SQL query. People tend to use string concatenation because they don’t know there’s another, safer method, and let’s be honest, string concatenation is simple, but it’s wrong step. A less common variant is SQL stored procedures that take a parameter and easily execute the argument or perform the string concatenation with the argument and so execute the result. Nowadays, it's very easy to perform Blind SQL injection compare to some years ago because lots of SQL injection tools available on the net. you'll download it from security website or hacker website and use it to check for MySQL, MSSQL or Oracle. By using these automated tools, it's very easy and fast to search out holes or bugs for SQL injection or Blind SQL injection from a web site. Finding Vulnerable URL Before you'll be able to perform Blind SQL Injection testing, you need to find a vulnerable URL or path from the web site where you'll inject malicious code or character to the vulnerable parameter on the web site. you would like to seek out out why your website is at risk of Blind SQL injection before you'll be able to perform SQL injection attack to the vulnerable parameter. to seek out a vulnerable URL path. Testing Vulnerable Parameter From the results of testing in webscan.txt, we found some possible Blind SQL injection bugs at the targeted server and trying to proof that bugs. Let’s say that you simply are auditing an online application server and located an online page that accepts dynamic user-provided values on GET or POST parameters or HTTP Cookie values or HTTP User-Agent header value. You now want to check for SQL injection vulnerability, and trying to take advantage of the vulnerability to retrieve the maximum amount as information from the net application’s back-end direction system or maybe is ready to access the underlying package. you want to have a symptom about the vulnerability that has been found by exploiting it until you'll get the findings. to check a vulnerable parameter, you'll be able to use manual technique or automated tool. SQLI Dumper can got a lote of combo list you can use this Combolist or database openbullet its best site to use combo list and sell hits sell and buy digtal goods Using Simple SQLi Dumper For Blind SQL Injection Simple SQLi Dumper (SSDp) is an open source PHP MYSQL injection tool written in Perl scripting language. it's wont to find bugs, errors or vulnerabilities in MySQL database. you need to understand and understand how to use SSDp tool. If you are doing not understand a way to use it, you'll be able to see the assistance menu that inbuilt along with this tool (Use ssdp.pl –h command to work out Help menu). From the targeted URL that i've got tested in Chapter 3 above, I found vulnerability at the parameter pageid is vulnerable for injection. So, I used this vulnerable page to check with SSDp tool.
Untitled
 

jessefarleigh

Member
LV
1
Joined
Jun 28, 2023
Threads
26
Likes
1
Awards
4
Credits
1,254©
Cash
0$
盲 SQL 注入是普通 SQL 注入的克隆,不同之处在于,当攻击者尝试使用应用程序时,他们不会得到有用的错误消息,而是得到开发人员指定的通用页面。这使得利用可能的 SQL 注入攻击变得更加困难,但并非不可能。攻击者仍然可以通过 SQL 语句询问一系列 True 和 False 问题来窃取数据。攻击者向您的数据库应用程序提供一些格式错误的数据,您的应用程序使用该数据通过字符串连接创建 SQL 语句。这允许攻击者改变 SQL 查询的语义。人们倾向于使用字符串连接,因为他们不知道还有另一种更安全的方法,老实说,字符串连接很简单,但这是错误的一步。一个不太常见的变体是 SQL 存储过程,它接受一个参数并轻松执行该参数或执行与参数的字符串连接,从而执行结果。如今,与几年前相比,执行 SQL 盲注变得非常容易,因为网上有很多 SQL 注入工具。您可以从安全网站或黑客网站下载它,并用它来检查 MySQL、MSSQL 或 Oracle。通过使用这些自动化工具,可以非常轻松快速地从网站中查找 SQL 注入或盲 SQL 注入的漏洞或错误。查找易受攻击的 URL 在您能够执行盲 SQL 注入测试之前,您需要从网站中找到易受攻击的 URL 或路径,您将在其中向网站上的易受攻击的参数注入恶意代码或字符。在能够对易受攻击的参数执行 SQL 注入攻击之前,您需要找出为什么您的网站面临 SQL 盲注风险。寻找易受攻击的 URL 路径。测试易受攻击的参数从webscan.txt的测试结果中,我们发现了目标服务器上可能存在的一些SQL盲注漏洞,并试图证明这些漏洞。假设您只是在审核在线应用程序服务器并找到一个在线页面,该页面接受动态用户提供的 GET 或 POST 参数值、HTTP Cookie 值或 HTTP User-Agent 标头值。您现在想要检查是否存在 SQL 注入漏洞,并尝试利用该漏洞从网络应用程序的后端指挥系统中检索最大数量的信息或准备访问底层包。您希望通过利用该漏洞获得有关已发现漏洞的症状,直到获得结果为止。要检查易受攻击的参数,您可以使用手动技术或自动化工具。SQLI Dumper 可以获得很多组合列表,您可以使用此 Combolist 或数据库 openbullet 它是使用组合列表并销售命中销售和购买数字商品的最佳网站 使用 Simple SQLi Dumper 进行盲 SQL 注入 Simple SQLi Dumper (SSDp) 是一个开源软件PHP MYSQL 注入工具用 Perl 脚本语言编写。它通常会发现 MySQL 数据库中的错误、错误或漏洞。你需要了解并理解如何使用SSDp工具。如果您不明白如何使用它,您将能够看到随该工具一起内置的帮助菜单(使用 ssdp.pl –h 命令来查看帮助菜单)。从我在上面第 3 章中测试的目标 URL 中,我发现参数 pageid 处存在漏洞,容易被注入。因此,我使用SSDp工具来检查这个易受攻击的页面。 View attachment 83764
Gooooooooooooooooooooood
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Recently searched:

Similar threads

Users who are viewing this thread

Top Bottom