SQL INJECTION – EXPLOITING FILTERATION VUNERABILITY USING ESCAPE CHARACTERS
Shubro has already discussed two articles on this topic and have given an overview of this vulnerability with working concept. But today I am going to explain the same with an example. Yes!! I am gonna hack a site and bypass the admin panel of the website. You will see me getting through the admin panel bypassing the login prompt!
This trick is quite old and still we find several sites having this vulnerability. Out of every 10 websites 4 are vulnerable to this attack, and these are very easily available through the search engines like Google, Yahoo and Bing! This SQL vulnerability is mostly found on asp governed sites.
NOTE: Information available here is strictly for education purpose. Any harm done to the website is at your own risk.
We are going to check the security of a Pakistani website http://nzaj.com.pk. I found this site by a random search on google. This site is scripted using asp and hence this trick have a maximum chances of working!
Here is the login page of the site:
Now we give an input which will bypass the login screen and take you to the admin panel and end up giving you the admin privileges.
The input will be admin in username field and ‘or’1′=’1 in password field.
The image below shows the entry of the login details:
Now click login… Yes…!!!! You got the admin privileges!!!
You can see that we have the complete access to his account and we are provided with the sensitive information of the admin. This information can be a gold mine to an attacker. He can get the details of the phonebook and perform social engineering, extract the valuable data and gain access to the C-panel!
This was just an example where I just demonstrated the way to hack with this kind of SQL attack. The further level of SQL injection will be discussed in the later on posts!
Hope you enjoyed… Feel free to pass the comments below and help us with your article review!
No comments:
Post a Comment