View Full Version : SQL Injection
warweed12
2008-11-11, 11:27
Just though i would show you guys somthing being that i know there is no threat to the corperation really by you seeing this
https://www.downeast.ca/intranet/
It is relativly easy injection but i want to see who breaks it first if your up to the challange .. you do not have to reveal what method of injection you used or the string
but i will know if you did it or not by you providing the Username in the upper right and the access level
the person who figures it out will be greeted with a bunch of aliant/downeast crapola access to hundreds of cellular unlock codes / programming instructions
and mainly a bunch of useless shit
i mainly wanted to point this out because i think its funny how a big corperation like aliant / downeast leaves them selves vulnerable to SQL injection
cheers and happy injecting,
warweed
PS to the mods if this in in appropriate i understand shoudl you wish to close / delete and sorry for the post
I've never really understood SQL injection very well. I have read quite a bit about it, but have never been successful in executing one.
I gave it a go, but to be honest I was just entering random SQL strings that I remembered. ' 1=1 etc.
Would you be able to point me to some resources to help me, where did you learn from?
Expl0itz
2008-11-11, 18:25
Blind SQL injection isn't going to help too much here. It might not even be a form injection. You could be an injection via POST/GET. I'll wait this out to see if anyone else gets it first.
warweed12
2008-11-11, 19:53
it is most certainly a form injection and it is not a complex one ;)
Hint:
look up SQL Injection cheat sheets
if not one gets it by 8-9pm GMT -7 i will just post it but wargasm is on the right track ;)
Expl0itz
2008-11-11, 20:03
it is most certainly a form injection and it is not a complex one ;)
Hint:
look up SQL Injection cheat sheets
if not one gets it by 8-9pm GMT -7 i will just post it but wargasm is on the right track ;)
Mmmmkay. I didn't really look at it. I was just throwing out ideas
warweed, can you give us until tommorow... I'd actually like to mess with this when I get home from work.
warweed12
2008-11-11, 21:16
sure :)
and browny point to who ever gets to the online order managment :P
there it's kinda cool because you can pull up rescent orders including cust name addy and esn
Soft Pizza
2008-11-11, 22:24
http://img.photobucket.com/albums/v343/FearOfLonelyDogs/done.jpg
Expl0itz
2008-11-11, 22:39
http://img.photobucket.com/albums/v343/FearOfLonelyDogs/done.jpg
Well, someone got it. :D
then again, this is the guy that wrote the SQL thread that I enjoyed. Now, don't give it away. Maybe point people in the right direction.
Soft Pizza
2008-11-11, 22:45
Heh well.. Pointers eh?
It's really basic stuff. Like... Really basic injection.
You're gonna have to do better than that to stomp me!
Expl0itz
2008-11-11, 22:48
Heh well.. Pointers eh?
It's really basic stuff. Like... Really basic injection.
You're gonna have to do better than that to stomp me!
Yeah... pointers... Let's turn it into a learning experience. I know I'm not too good at SQL injection. I CAN do it... just with a lot of frustration sometimes. It'd be beneficial to a lot of people.
Soft Pizza
2008-11-11, 22:51
Well you're not going to learn advance SQL injection from cheat sheets, but it will help you with this challenge. Read my paper, it may be in there.
warweed12
2008-11-11, 23:30
lol indeed but cheers on getting it
Trueborn Vorpal
2008-11-12, 17:35
sure :)
and browny point to who ever gets to the online order managment :P
there it's kinda cool because you can pull up rescent orders including cust name addy and esn
http://img247.imageshack.us/img247/6862/orderapprovalhn7.png
http://img253.imageshack.us/img253/545/ordereditingfy9.png
Is that good enough for ya? ;)
warweed12
2008-11-12, 19:53
naw thats not really impressive because that in the pending bussiness card orders for down east
http://i33.tinypic.com/qrxmvc.jpg
not secure once your in the intranet :P
http://i33.tinypic.com/qrxmvc.jpg
try somthing like this
http://i36.tinypic.com/25z1rbb.jpg
or if you really want somthing
http://i33.tinypic.com/9i93px.jpg
http://i35.tinypic.com/11v3c40.jpg
http://img.photobucket.com/albums/v689/Maddman/downeast.jpg
Thanks for that. Interesting.
ParkedCar
2008-11-13, 09:45
Security Clearance Level 1:
http://img401.imageshack.us/img401/6733/shotas8.png
Meh, I've done real SQL injections like this, and it's never THAT easy usually. IIRC (I don't like to fuck with MSSQL), it's something like having 1=1--, then you continue to add each field you get like password, and continue to grab each table (looks like only 2 columns require fetching here) until you have all the information. Bleh.
http://i43.photobucket.com/albums/e351/expendable_youth/downeast.jpg
Thought it would be harder than that, thanks for this thread warweed. I'll have a play around with the site later on.
warweed12
2008-11-13, 19:12
cheers :)
Shoplifter
2008-11-14, 02:22
Sweet, that was easy! :D
http://upload-fast.com/files/ccf22dc6fde363765ebd3c686fd1539d.PNG (http://upload-fast.com/?url=ccf22dc6fde363765ebd3c686fd1539d.PNG)
Alright, reading this got me interested...
tried entering 1=1-- and ' into URL and user/pass fields, but it just went back to default.asp
Oh well, back to google.
lol http://i37.tinypic.com/m8pgtu.jpg
Expl0itz
2008-11-16, 20:17
http://i70.photobucket.com/albums/i91/O__RLY/SQLinject.jpg
I had more trouble with this then I should have. Well, constantly being interrupted at work, and over thinking it could be blamed for it.... LAWL.
Alright, reading this got me interested...
tried entering 1=1-- and ' into URL and user/pass fields, but it just went back to default.asp
Oh well, back to google.
Hahahahahahhahahahahaha, fucking noob. First off, an injection HAS to begin with a '
Try combining the two FIRST, then go from there. It's MSSQL, not MYSQL also, remember.
Expl0itz
2008-11-16, 21:38
Hahahahahahhahahahahaha, fucking noob. First off, an injection HAS to begin with a '
Try combining the two FIRST, then go from there. It's MSSQL, not MYSQL also, remember.
Aww clover. You could be nice for a change ;)
We all started out at the bottom of the chain once.
Numberjumbo
2008-11-16, 23:05
Lol, organising criminal activity on totse. Have fun with your b&.
Hahahahahahhahahahahaha, fucking noob. First off, an injection HAS to begin with a '
Try combining the two FIRST, then go from there. It's MSSQL, not MYSQL also, remember.
Gotta learn somehow.
*Tries again*
Edit: Wow, I think I'm actually getting somewhere now...I was entering 1=1-- and ' in completely wrong places...
Gotta learn somehow.
*Tries again*
Edit: Wow, I think I'm actually getting somewhere now...I was entering 1=1-- and ' in completely wrong places...
anything' or 'x'='x
Gotta learn somehow.
*Tries again*
Edit: Wow, I think I'm actually getting somewhere now...I was entering 1=1-- and ' in completely wrong places...
Learn to code. All a 'hacker' is is a sensible coder, you can't just become a 1337 h4x0r by learning how to do ancient exploits that have been out so long that any programmer with a half a brain could patch in about 2.5 seconds...
I'm starting to wonder if I'm doing this right again...
I ended up trying this:
'union select passwords,null from username
got an error having to do with the number of columns.
I read to keep adding nulls until you stopped getting the error.
But it seems no matter how many nulls I add, it still gives that error.
Bah, probably something really stupid.
Learn to code. All a 'hacker' is is a sensible coder, you can't just become a 1337 h4x0r by learning how to do ancient exploits that have been out so long that any programmer with a half a brain could patch in about 2.5 seconds...
Alright, I'll look up mssql commands.
The only thing I've been really successful in learning is how to script/code is doom 3 weapons, machines, enemies, etc.
Alright, I'll look up mssql commands.
The only thing I've been really successful in learning is how to script/code is doom 3 weapons, machines, enemies, etc.
Afterward, read this. It goes through the basic approaches to SQL injection.
www.unixwiz.net/techtips/sql-injection.html
warweed12
2008-11-17, 09:02
thanks for the great link :)
thou alot of people are over thinking with trying to call tables and such
it is a rather simple injection
-HINT: it always returns true ;)
try looking up a SQL injection cheat sheet
it is rather simple somthing like OR 'x'='x but not quite that :P but same principal
Numberjumbo
2008-11-18, 00:06
Lol, organising criminal activity on totse. Have fun with your b&.
This.
warweed12
2008-11-19, 01:30
Alright alirght who was the wise ass who changed the user to Duck_Head :P
Shoplifter
2008-11-19, 02:07
Alright alirght who was the wise ass who changed the user to Duck_Head :P
hahah lol that was me
Edit: Damn! they changed it back to Micmac
warweed12
2008-11-19, 06:00
hurm when did you change it and do you mind me asking what string "you" used or you can email me owner at warweed dot com
Captain Douche
2008-11-24, 07:42
I know nothing about coding, SQL Injections or anything a mile within the range of hacking but I know this:
This thread is full of premium win.
Thanks for that man, good fun... We should set up more of these...
http://i38.tinypic.com/24x1cmr.png
ataraxia
2008-11-26, 08:06
This.
It's a learning experience. There's nothing being damaged.
warweed12
2008-11-28, 08:27
Would anyone else like to provide some easy basic sql injectable sites as examples ?
Expl0itz
2008-11-28, 14:37
Would anyone else like to provide some easy basic sql injectable sites as examples ?
Ummm... none can be posted. Yet.
Prometheum
2008-11-28, 16:49
Ummm... none can be posted. Yet.
Oh lol, I see where this is going.
warweed12
2008-12-01, 04:36
.... :(
Would anyone else like to provide some easy basic sql injectable sites as examples ?
Just to let you know, I am looking, I just haven't found any yet.
How did you come about finding downeast?
Also, is there somewhere private we(people who managed the first injection) can share strings we used? I'm curious how the other guy changed the username. Based on the amount of hits this thread has had though, don't think we'll be sharing much in here.
ParkedCar
2008-12-02, 18:57
...I'm curious how the other guy changed the username...
If you get access to an account with security clearance level 1, you can change account settings.
Legalities
I've been looking around, but haven't really found any good, solid information on this matter.
What exactly are the legal ramifications of what we are doing? I've found papers regarding SQL injection into search bars, and that seems to be a gray area; but you will come out on top, so long as you don't modify anything.
However what we are doing it very different to search bars. Anyone have any ideas on what the sentence would be if you were tracked down?
I imagine it would be quite a lengthy and costly process to find someone, and if nothing was damaged then they probably wouldn't bother. But hypothetically, lets just say they have money to blow, and they do track you. Anyone know what would happen?
Prometheum
2008-12-03, 00:42
Legalities
I've been looking around, but haven't really found any good, solid information on this matter.
What exactly are the legal ramifications of what we are doing? I've found papers regarding SQL injection into search bars, and that seems to be a gray area; but you will come out on top, so long as you don't modify anything.
However what we are doing it very different to search bars. Anyone have any ideas on what the sentence would be if you were tracked down?
I imagine it would be quite a lengthy and costly process to find someone, and if nothing was damaged then they probably wouldn't bother. But hypothetically, lets just say they have money to blow, and they do track you. Anyone know what would happen?
Federal prison, in the US of A. But they never track anyone down, because it never gets reported.
Federal prison, in the US of A. But they never track anyone down, because it never gets reported.
I see. Where did you get that information? I'd like to look at some cases if you know of any.
Thanks for the reply.
ThunderChicken
2008-12-03, 05:20
I see. Where did you get that information? I'd like to look at some cases if you know of any.
Thanks for the reply.
http://www.google.com/search?hl=en&client=firefox-a&rls=org.mozilla:en-US:official&hs=924&sa=X&oi=spell&resnum=0&ct=result&cd=1&q=State+court+records&spell=1
;) might help
If you get access to an account with security clearance level 1, you can change account settings.
http://img75.imageshack.us/img75/1152/lolwutlt7.jpg
LOL. That was retardedly easy? I can't believe I didn't think of that until now.
EDIT: I think this account has full admin privileges, I can edit the President of the company's info if I want. This is seriously the worst site security I have ever come across, I mean holy shit.
If you guys want to have some real fun, the columns here are:
password,empid,name,Dept1,Dept2,Dept3,Dept4,Dept5, Dept6,Dept7,SecurityLevel
Is this really just an insanely insecure site? I thought it was kind of a "hack this site" sort of deal. LOL!
I didn't even need SQL injection to get level 1 access, the person who programmed this website must be borderline retarded.
Oh wow, that is indeed one insecure site. Hey, and aren't those auction goods on the Home page lovely? At least, I assume it's for a charity auction. I especially like the "Little Bit O' Everything" accessory pack. And the hand-knitted brown scarf at the top... Priceless!
warweed12
2008-12-05, 08:58
glad yall like it and no i got access a loooong time ago
aliant / downeast piggy back off bell canadas CDMA cellular network ... when i first found it i would access the order center and find peoples names addresses ect. enough to verify there mobile account then i would pose as a store rep have trouble up dateing the customers ESN in "rapsody" there dealer program and would ask them to then they ask for dealer codes and such which again are on the downeast page ... along with programming codes for various cdma phones
so i would reprogram my shit phone with a new number every couple of hours some times days :)
PS if everyone wants to share there strings you can email them to owner@warweed.com and i shall compile a list at the end of next week :)
and post it on my personal site and share the link but not as to whom used what or so on .. or just give me details in the email if you want your name posted or not ect..
-warweed
warweed12
2008-12-05, 09:06
I didn't even need SQL injection to get level 1 access, the person who programmed this website must be borderline retarded.
haha sssssshhh and yes i would have to agree
warweed12
2008-12-06, 08:34
well i rather say this is intresting how many people have viewed this page
warweed12
2008-12-06, 09:25
Go nuts ! :) if anyone comes across somthing intresting let me knwo :) http://www.google.ca/search?hl=en&q=inurl%3A%2Fadmin%2Flogin.asp&meta=
well i rather say this is intresting how many people have viewed this page
Didn't even think the entire NS&H section got this many hits in a month. Anyone know if other forums been linking to this, or other sections on totse?
I use a different google search to find vulnerable sites. Get a good return on them, but google doesn't let me view many pages of results. It knows what I'm trying to do, so stops me :(
Anyone know of a workaround?
EDIT:
Nevermind, found a way of getting around it.
Just used a different version of google. Much more sites to play with now :)
Here's a joke of a site, not exactly interesting, but none the less.
http://www.pathwaystocollege.net
warweed12
2008-12-06, 18:04
which part is "intresting" /admin/ ?
which part is "intresting" /admin/ ?
Sites pretty dull, but:
http://pathwaystocollege.net/collegereadiness/toolbox/index.asp
Online psychiatry website was a bit more interesting. Leave you to find that one yourself though, the url is about as obvious as it gets ;) I think the passwords are stored in plaintext....
Expl0itz
2008-12-06, 21:49
=O
http://www.dacaar.org/dacaar.asp?id=%27%20or%20%27%201=1--
warweed12
2008-12-06, 23:33
=O
http://www.dacaar.org/dacaar.asp?id=%27%20or%20%27%201=1--
Microsoft OLE DB Provider for ODBC Drivers error '80040e14'
[Microsoft][ODBC Microsoft Access Driver] Syntax error (missing operator) in query expression 'id=' or ' 1=1--'.
/dacaar.asp, line 326
??????
FailedArtifact
2008-12-07, 09:49
I get that message.. i tried deleting the 'onsubmit= return check(this.password)' (of the original website mentioned by warweed), but no luck. Any hints?
FailedArtifact
2008-12-07, 13:39
Originally Posted by Expl0itz View Post
=O
http://www.dacaar.org/dacaar.asp?id=...%20%27%201=1--
I get this message after putting a ' in the search box.
Microsoft OLE DB Provider for ODBC Drivers error '80040e14'
[Microsoft][ODBC Microsoft Access Driver] Syntax error in query expression 'tekst like '%'%' UNION ALL select dato,name,id,news from newssystem where news like '%'%''.
/dacaar.asp, line 402
warweed12
2008-12-07, 18:35
what is it your trying to acheive ?
thne we can work towards that ?
FailedArtifact
2008-12-08, 11:45
Sorry, my posts were a bit muddled. I would like to login into the site you mention. (Downeast intranet), People keep stating the "1=1 --". But i haven't been able to get in. I have looked at the source code, and deleted the "onsubmit=" command which checks the password, though still no luck. Can someone give me any HINTS, don't actually tell me how to do it.
Thanks
Sorry, my posts were a bit muddled. I would like to login into the site you mention. (Downeast intranet), People keep stating the "1=1 --". But i haven't been able to get in. I have looked at the source code, and deleted the "onsubmit=" command which checks the password, though still no luck. Can someone give me any HINTS, don't actually tell me how to do it.
Thanks
Don't think anyone can offer any more specific hints, without revealing the answer. You're on the right tracks though. I would suggest you google for 'SQL injection cheat sheets' / cheet sheets. The answer is in one of the first results.
FailedArtifact
2008-12-08, 13:07
I see what you mean by how close i was... though the code changing in source is not necessary for this website.
http://i37.tinypic.com/ir8irt.jpg
Another one bites the dust?
warweed12
2008-12-09, 01:19
Mods Please lock this thread and reffer to SQL INJECTION pt 2.
For those who gave up thanks for playing the injection was a very simple form injection
1' OR '1'='1
alternativly if the webadmin was not extremly extremly retarded he also would not have made a web development account with admin privs. with the authentication as test:test
Cheers and thanks for playing see next thread
trippson
2008-12-09, 01:33
http://i157.photobucket.com/albums/t45/t1337/Screenshot.png
and another one