Home page logo
/

pen-test logo Penetration Testing mailing list archives

Re: tool recommendations and sql injection help
From: "Mike Klingler" <whitehatguru () gmail com>
Date: Sat, 29 Jul 2006 14:46:01 -0500

Travis,

When attempting SQL injections against a website there are some steps
that can help to get data.  The first think that I like to do is to
get an added string that will show the page properly.  I would copy
the query string for the page that worked properly and add stuff to
that.
If page were   show.asp?newsid=2
I would try to see if it displayed properly with these query
show.asp?newsid=2' AND '1'=='1
If that gave the same page back without any errors that means that you
have found the "YES" page.

Next I would try
show.asp?newsid=2' AND '1'=='0

If that gave a page with blank result where content would be that
means you have found your "NO" page.  The NO page is good to have
becuase it allows you to confirm that the syntax of the query was
processed properly.  Lacking a "NO" page it is hard to be sure if your
syntax is messed up or not.

Once you can get a YES and NO and an error page you should be able to
execute any SQL command against the server within the scope of the
users priveledges unless they have some input validation and checking.
However, that is an entirely different conversation.

On 7/27/06, Travis <teedubb () gmail com> wrote:
i am performing an external scan for a company.  i have already ran
nessus and nikto.  neither one of these turned up any major
vulnearabilities other than a possible sql injection, seen below.

---------------------------------------------------------------------------

Microsoft JET Database Engine error '80040e14'

Syntax error in string in query expression 'NewsID=''.

/news-article.asp, line 15

----------------------------------------------------------------------------

nessus gave the following vulnerability message

----------------------------------------------------------------------------

The following URLs seem to be vulnerable to various SQL injection
techniques :

/news-article.asp?NewsID='UNION'
/news-article.asp?NewsID='
/news-article.asp?NewsID='
/news-article.asp?NewsID='%22
/news-article.asp?NewsID='%22
/news-article.asp?NewsID=9%2c+9%2c+9
/news-article.asp?NewsID=9%2c+9%2c+9
/news-article.asp?NewsID='bad_bad_value
/news-article.asp?NewsID='bad_bad_value
/news-article.asp?NewsID=bad_bad_value'
/news-article.asp?NewsID=bad_bad_value'
/news-article.asp?NewsID='+OR+'
/news-article.asp?NewsID='WHERE
/news-article.asp?NewsID='WHERE
/news-article.asp?NewsID=%3B
/news-article.asp?NewsID=%3B
/news-article.asp?NewsID='OR
/news-article.asp?NewsID='OR

-------------------------------------------------------------------

when i report this vulnearability to the company i want to show
evidence of data that i got from the injection.  i have read white
papers on sql injections and i have tried all the usual suspects when
it comes to sql injections but still no luck.  is there something
special with Microsoft JET database?  what would be some sql
injections i could try to pull back table information?  i have tried
an automated too such as Absinthe, not sure how to use it though.

what is your take on commercial software that scans (e.g. webinspect,
saint), should i give those a shot as well or will nessus do the
trick?

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------




--
Michael Klingler, CISSP
SecurityMetrics Penetration Tester

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]