Showing posts with label Sql injection. Show all posts
Showing posts with label Sql injection. Show all posts

Saturday, 21 April 2012

D35m0nd142 found Blind SQL Injection vulnerability in Sophos website

crackthesecurity | 01:08 | | Be the first to comment!
A hacker called as D35m0nd142 has discovered Blind SQL Injection Vulnerability in the official website of Sophos ( Award Winning Antivirus, Email Spam Protection and Endpoint Management Software for Windows, Mac and Linux).



Hacker exposed the vulnerability URL in pastebin, provided a screenshot which proves security breach in sophos website.

Pastebin:
http://pastebin.com/nm236z9x

In past, hacker discovered vulnerability in Oracle, Skype , United Nations websites .
Read More...


Team INTRA hacked MTV.com.au and Toshiba Subdomain

crackthesecurity | 01:05 | | Be the first to comment!
Team INTRA, one of the infamous hacker group, hacked MTV.com.au website and exposed database in pastebin. MTV Australia is 24 hour general entertainment channel specialising in music and youth culture programming which serves Australia.

The dump of the database contains username and password of admin and other users.  Unfortunately, passwords are in plain text.  Also, The password are very simple to guess.

Hackers also provide a vulnerable link of the mtv.com.au website.  The subdomain gallery.mtv.com.au is vulnerable to SQL Injection attack.

Pastebin link:
http://pastebin.com/CpaAUuXN

Update
Hackers also discovered SQL injection vulnerability in one of subdomain of Toshiba and exploited the vulnerability.  They dump the database details in pastebin. The dump has the username and passwords in plain text.
Read More...


Monday, 16 April 2012

Enema v.1.6 SQL Injection Tool Released

crackthesecurity | 07:31 | | Be the first to comment!
Enema gets an update and releases version v.1.6. Enema is a SQL injection tool but not an automatic tool. So this tool is not so popular and used. This tool is for those who knows what to do. This tool has one more drawback that it only supports latest version of database servers.
  • Features:
    1. Multi-platform.
    2. User-friendly graphical interface.
    3. Multithreaded.
    4. Dump.
    5. Customise your queries
    6. Plugins to automate attacks
  • Supported for today:
    1. POST, GET, Cookies
    2. MSSQL >=2000 and MySQL>=5.0
  • Injection methods supported:
    1. Error based injection.
    2. Union based injection (using subquery).
    3. Blind Time-based MSSQL(waitfor), MySQL(sleep)
Download: http://code.google.com/p/enema/downloads/list 

Video Demo: http://code.google.com/p/enema/wiki/Video



Read More...


Saturday, 14 April 2012

SQL INJECTION | Website Deface | Using tool | Live Example

crackthesecurity | 06:11 | | Be the first to comment!
What is SQL injection ?

SQL stands for Structured Query Language.SQL is used to design the databses. The information is stored in databses. SQL injection is the vulnerability occuring in database layer of application which allow attacker to see the contents stored in database. This vulnerabilty occures when the user's input is not filtered or improperly filtered.


The main goal of attacker is use to access the information stored in website's database. It can be done manually. In this tutorial, I am using to do the same thing easily using a tool.


I remind you again that its only for educational purposes.


Requirement: Download the tool from here.  Its SqliHelperV.2.1.


Steps of attack :-


Vulnerable Website > Database > Tables > Columns > Data


 Search for any vulnerable website using Google Dorks. I found this website
http://www.shelter.org/org/news.php?id=5
I came to know its vulnerable because when I attached a single quote at the end, it didn't filter it and returned me with an error.


http://www.shelter.org/org/news.php?id=5'


Step 1.  Run the tool and there is no need of any installation. Input the vulnerable URL and click on 'Inject'




 

Step 2 : After processing is done. Click on "Get Database".It would then show the databases



Step 3:  Select any database other than "Information_schema" and Click on "Get tables". It would start fetching all tables. Have some patience. In most of the cases there is a table like admin or login or users etc.

 
Step 4: Select any Table and click on "Get Columns".



Step 5: Select the column and click on "Dump Now" . A new pop up window would open showing you the data stored in it.









So You came to know that how deadly it could be to allow users to send their input without any filteration/validation. So never be lazy at programming and use possible filteration mechanisms.
Read More...


Google Dorks | Using Google efficiently

crackthesecurity | 06:02 | | Be the first to comment!
Do you know how to use google ? Sounds a silly question because even children can easily use google search engine.But the thing is that how efficiently we can make use of google. Google dorks are nothing but simple search operators that are used to refine our search. okay lets suppose that you wanna search for ebooks on topic 'networking' , our obvious search queries would be like this "Networking ebooks", "free ebooks for networking" etc,we keep going into the websites, clicking on link after links and then get proper downling links. Now lets do the same search in a different way , type on google "ext:pdf networking" (without quotes)


and see what you get in results,google returned direct downloading links of ebooks on networking that is files with extension pdf.
I hope you have got an idea of google dorks or google search operators.

List of basic search oprators,their description and examples.

1. site - It returns the websites of specified domains .

Example- site:explorehacking.com will return the links of webpages of  domain explorehacking.com. site:explorehacking.com phishing will return all the webpages of domain explorehacking.com which contain word 'phishing'.
Suppose you want google to return only government websites,
you can use site:gov or say pakistani websites use site:pk

2.intitle and allintitle - It restricts the results to pages whose title contain specified word/phrase.

 examples-
intitle:admin will return only those pages whose title contains word 'admin'.
intitle:admin login will return only those pages whose title contains word 'admin' and word 'login' can be in anywhere in page.
allintitle:admin login will return those pages whose title contains both words admin and login. This is simply equivalent to intitle:admin intitle:login

3.inurl- as clear from name, it restricts the results to sites whose URL's contains specified phrase.

examples-
inurl:adminlogin will return only those pages whose URL contains  'adminlogin'.
 Like allintitle, you can similarly use allinurl. I dont feel there is need to explain allinurl.

4. related- It returns the websites similar to specified websites.

examples :-
related:www.mobivox.com , now mobivox.com provides free/cheap calls facility. This search query would return results containing websites which provide such kind of services.
related:www.hidemyass.com , now hidemyass.com provides services to maintain anonymity using proxies.This search query would return results containing websites which provide services related to proxies.

5. cache: It returns the cached webpage that is kept with google.

example:-
cache:www.explorehacking.com, this dork is useful very when actually the website is down and
you can still view its contents (from cached pages).

 6. ext- It specifies the extension .

You can use 'filteype' at place of 'ext'.
example-:
ext:ppt hacking - this will return  powerpoint presentations (ppt files) on topic 'hacking'.
ext:doc hacking - this will return microsoft word files on topic 'hacking'

 Extensions that google supports are pdf,swf,rtf,doc,ppt,dwf,ps,kml,kmz,xls.


Note: Undoubtedly,you can combine these search operators for example
site:gov inurl:adminlogin will return the government site webpages who have word 'adminlogin' in URL.



Accessing Unprotected Cameras using google ?
So the heading sounds interesting. We can access the live cameras using google dorks.
Remember, cameras are also present at beaches ;)
Just type this in google search box and hit enter.
inurl:view/index.shtml .

Many of these wont ask for password, view might be dark (coz it would be night there) and you need good internet speed . Have fun.

Download a long list of such dorks to view unprotected cameras and the software from here.

Note:These google dorks when used smartly are really useful from hacker's point of view to search for vulnerable websites. I will try to write a post regarding same.
Read More...