# Exploit Title: Supernews # Google Dork: intext: "2003-2004: SuperNews: Todos OS direitos reservados"# Date: 2012/# Author: WhiteCollarGroup# Software Link: http://phpbrasil.com/script/vT0FaOCySSH/supernews# Version: 2.6.1# Tested on: Debian GNU/Linux/*Exploit for educational purpose only.Note sent to the developer Fernando Pontes by e-mail odnanrefsetnop@bol.com.brSuperNews are a warning Ilian news system
I sent Discuz some time ago! EXP of version 5.0.0 GBKI saw the 4. x in CN. Tink today. I went to the origin site and found a Discuz! 4.1.0 has been tested. The test succeeds. See the following: Discuz! Some of the EXP in version 5.0.0 GBK does not know how to use it. I told you that some of my friends still don't understand it. This time I cut the figure and, if you don't know how to use it, you should understand it.Figure:
Copy codeThe Code is as follows: Print_r ('
---------------------------
Label:FREEBUF burst Zabbix SQL injection: http://www.freebuf.com/vuls/112197.htmlVulnerability testing:User name and password:
http://192.168.1.13/zabbix/jsrpc.php?type=9method=screen.gettimestamp=1471403798083pageFile=history.phpprofileIdx=web.item.graphprofileIdx2=(select (1) from users where 1=1 aNd (SELECT 1 FROM (select count(*),concat(floor(rand(0)*2),(substring((Select (select concat
Tags: sqlIdea: Upload a "backdoor", through the control back door to get the shell, such as a word Trojan. Like what:PHP A word trojan, directly on the chopperThis constructs the following statement:1 ' and 1=2 Union select ' into outfile "d:\\xampp\\htdocs\\dvwa\\yy.php" #1 ' and 1=2 Union select 1, ' 650) this.width=650; "Src=" Http://s4.51cto.com/wyfs02/M02/86/CF/wKiom1fLzO6w2AbHAAIURuE1dG4326.jpg-wh_500x0-wm_3 -wmp_4-s_1679569698.jpg "title=" cmd.jpg "alt=" Wkiom1flzo6w2abhaaiurue1dg4326.jpg
1. SQL InjectionSo far, I have hardly seen anyone who has written a very complete article, or a very mature solution (there are certainly many people who can do it, and the problem is that it has not been spread. Unfortunately) I would like to give a few simple points to inspire everyone to think about and play a role in attracting others.
I. Principles of SQL Injection
, today's SQL injection attackers are smarter and more comprehensive about how to find vulnerable sites. Some new methods of SQL attack have emerged. Hackers can use a variety of tools to speed up the exploit process. Let's take a look at the Asprox Trojan, which is mainly spread through a spam-sending zombie network,
Label:"SQL injection" talking about post injection in SQL injection This article source: I Spring and Autumn College 00x01 In many communication groups, I see a lot of friends for post injection is very confused, once geometry
1. About SQL injection
So far, I have not seen who wrote a very complete article, or a very mature solution (can do a lot of people, the problem is not spread out, very sorry) I simply said a few, hope to inspire people to think, play a role in the discussion
First, the principle of SQL injection
The implementation
Tags: record is to write the EAL engine special Password page fromSQL Injection VulnerabilityPrinciple: As the developer writes the operation database code, the external controllable parameter is directly stitched into the SQL statement, and is placed directly into the database engine without any filtering.Attack Mode:(1) When permissions are large, write directly to Webshell or execute system commands dire
fullest. Because this article is mainly about SQL injection, please refer to the other information for the question of right to raise.(2) Tool injectionThrough the above introduction and manual injection of examples, we have a complete understanding of the principle of SQL injecti
This paper describes the simple implementation of SQL anti-injection method in PHP. Share to everyone for your reference, as follows:
There is not much filtering here, mainly for PHP and MySQL combination.
General anti-injection, as long as the use of PHP addslashes function is possible.
Here's a copy of the code:
PHP Code:
$_post = Sql_injection ($_post); $_ge
Tags: system commands basic MAC application strong AC win window viaReprinted from: Https://bbs.ichunqiu.com/thread-12105-1-1.html What is SQL injection SQL Injection Basic IntroductionStructured Query Language (structured query Language, abbreviation: SQL) is a special pro
experts can do the same, and the new users can do the same.
Details>
Http://blog.csdn.net/wufeng4552/archive/2008/12/05/3449940.aspx
Cross-Site SQL Injection
Learn how to get the desired content from the database.
Details>
Http://blog.csdn.net/wufeng4552/archive/2008/12/05/3449948.aspx
Prevent SQL injection attacks
some time ago, in a lot of blogs and micro-blog burst out of the 12306 some loopholes in the website of the Ministry of Railways, as such a large project, it is not impossible to say that there are loopholes, but the loopholes are some novice programmers will make mistakes. In fact , the SQL Injection vulnerability is one. As a rookie little programmer, I know nothing about
SQL injection focuses on the construction of SQL statements, only the flexible use of SQL
Statement to construct the injected string of the bull ratio. After finishing the study, I wrote some notes, ready to use. I hope you're looking at the following.
The rationale for solving SQL
Affected Systems:
Php-nuke Php-nuke
Describe:
Php-nuke is a popular web site creation and management tool that can use a lot of database software as a backend, such as MySQL, PostgreSQL, mSQL, InterBase, Sybase, and so on.
There are multiple SQL injection vulnerabilities on the Php-nuke implementation that remote attackers may exploit to unauthorized operati
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.