basic 21
only_samurai wrote:
80040E14 is not an "unenclosed ***" error
lol ya i tried googleing the error just to see what came up, that confused me
and also the challenge descriptions says "This time Drake invented another secure PHP and MSSQL login. But he once again failed to secure it…" its secure but not secure?????!!!!!
Don't try character per character to find the username ;)
PM me what you guys have, I'll adjust some things. Please note that we have to simulate everything in a challenge. Making a real connection to a database would be a bit hazardous for HBH ;)
The challenge is new, so if you have any suggestions or remarks, you can PM me about them and I'll do my best.
Anti wrote: i found an error and i found the name of the table and the names of the columns…. what should i do next ?
Why don't you try to view the values of some fields ;)
sakarin wrote: i was past that hint. cell and i've also pm'd you before about it.
I'm in the middle of my partial exams so I won't be answering/checking any PM's till this weekend.
lol ^^
well.. Ive gone past your hint… I found how many columns, I found what I needded to extract.. Ive already tried the spacing between commas
blah, blah blah , blah blah ,blah blah,blah
but I know and you know that the first line is correct, but after you have reached to the 3rd column, it just doesnt show error anymore. someone please PM me!!!!
I've been getting a bunch of requests for the whitepaper on how to defeat this challenge…If the admins or The_Cell don't mind me posting it, you can find it at:
http://www.scribd.com/doc/20582/Advanced-SQL-Injection
It's a great paper on some more specific types of SQL Injection instead of the old ' OR 1=1– stuff.
The_Cell gave the biggest hint on the first page of this thread on what you need to search for. Just HAVING a clue will allow you to beat this :D
The_Cell, let me know if you want me to remove this post.
Hello,
I was able to get the names of all columns, but I'm still failing to extract password from the database.
I've tried the UNION command with NO effect. And the paper about Advanced-SQL-Injection also did no helped me much.
I need to be pointed to the right direction.
Any help will be grealty appriciated! :)
The answer is right there in the whitepaper….
After you've found out what columns exist in the table, you need to find a way to enumerate values from those columns. The problem with the login page is that it is not designed to return the values that you've queried, just allow access to a user that has credentials in the table. In that case, we need to be able to find a way to get data from the tables. We do that by enumerating values through syntax errors.
After the section in the whitepaper that shows you how to enumerate the column names, read further on how to create type convertion errors…Once you know how to do that, you can enumerate the usernames and passwords through error messages. The answers are in there…just read a little further down :)
contmp wrote: Hello,
I was able to get the names of all columns, but I'm still failing to extract password from the database.
I've tried the UNION command with NO effect. And the paper about Advanced-SQL-Injection also did no helped me much.
I need to be pointed to the right direction.
Any help will be grealty appriciated! :)
i had this same problem. try doing different amounts of 1's (another bug, i think)
LanceUppercut wrote: The answer is right there in the whitepaper….
After you've found out what columns exist in the table, you need to find a way to enumerate values from those columns. The problem with the login page is that it is not designed to return the values that you've queried, just allow access to a user that has credentials in the table. In that case, we need to be able to find a way to get data from the tables. We do that by enumerating values through syntax errors.
After the section in the whitepaper that shows you how to enumerate the column names, read further on how to create type convertion errors…Once you know how to do that, you can enumerate the usernames and passwords through error messages. The answers are in there…just read a little further down :)
thanx for the reply, but still the damn challenge is giving me a headache. the damn username query has to be very specific. for example in previous part *hvn 1=1 **worked but 2=2 did NOT. i know that's probably because it is simulated, but still wtf! :-(