Waraxe IT Security Portal
Login or Register
November 4, 2025
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 64
Members: 0
Total: 64
Full disclosure
SEC Consult SA-20251029-0 :: Unprotected NFC card manipulation leading to free top-up in GiroWeb Cashless Catering Solutions (only legacy customer infrastructure)
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: : "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Dovecot CVE-2025-30189: Auth cache causes access to wrongaccount
SEC Consult SA-20251027-0 :: Unauthenticated Local File Disclosure in MPDV Mikrolab MIP 2 / FEDRA 2 / HYDRA X Manufacturing Execution System #CVE-2025-12055
Stored Cross-Site Scripting (XSS) via SVG File Upload -totaljsv5013
Stored HTML Injection - Layout Functionality - totaljsv5013
Stored Cross-Site Scripting (XSS) - Layout Functionality -totaljsv5013
Current Password not Required When Changing Password -totaljsv5013
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Struts2 and Related Framework Array/Collection DoS
[REVIVE-SA-2025-002] Revive Adserver Vulnerability
[REVIVE-SA-2025-001] Revive Adserver Vulnerability
SEC Consult SA-20251021-0 :: Multiple Vulnerabilities in EfficientLab WorkExaminer Professional (CVE-2025-10639, CVE-2025-10640, CVE-2025-10641)
[SYSS-2025-017]: Verbatim Store 'n' Go Secure Portable HDD (security update v1.0.0.6) - Offline brute-force attack
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> Sql injection -> You Can Do SQL Injection Here ?
Post new topicReply to topic View previous topic :: View next topic
You Can Do SQL Injection Here ?
PostPosted: Fri Jun 24, 2005 4:16 pm Reply with quote
Devil-00
Regular user
Regular user
Joined: Apr 27, 2005
Posts: 6
Location: Palestine , Jerusalem




Hi ,,
I Have Fucntion From My Frind ,, Embarassed
We Wanna To Stop SQL Injections ,,
We Can Use This Function To Stop SQL Injections ?

Code:

function SqlStatments ($text)

{

$text = strtolower($text);



$text = str_replace('delete','',$text);

$text = str_replace('truncate','',$text);

$text = str_replace('update','',$text);

$text = str_replace('union','',$text);

$text = str_replace('insert','',$text);

$text = str_replace('select','',$text);



return $text;

}

And About XSS .. We Can Stop Attack By This Function ?
Code:

function Characters ($text)

{

$text = str_replace('<','',$text);

$text = str_replace('>','',$text);

$text = str_replace('%22','',$text);

$text = str_replace('%3C','',$text);

$text = str_replace('%3E','',$text);



return $text;

}


Sorry For My Bad English Embarassed
View user's profile Send private message Visit poster's website AIM Address MSN Messenger ICQ Number
PostPosted: Fri Jul 22, 2005 4:00 am Reply with quote
Tirim
Beginner
Beginner
Joined: Jul 22, 2005
Posts: 2




'; UP/**/DATE SomeTable SET Password ='blah' where 1=1--

The above example will evade the sanitization methods you use, because /**/ is treated as a comment, breaking the 'UPDATE' statement into fragements without making the query invalid.

A variable can also be declared as a hex equivilant of an SQL Query and then executed, as in @foobar = 0x73656c65637420404076657273696f6e; exec (@foobar)--.

Having a list of 'badwords' is not the best solution to guard against SQL Injection.

Cheers Cool
View user's profile Send private message
PostPosted: Fri Jul 22, 2005 11:28 am Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




I can't imagine any practical use of application, where such common words as "delete" and "select" are forbidden. Even "union" - what about European Union? This code will smash up this!
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Fri Jul 22, 2005 9:50 pm Reply with quote
Chb
Valuable expert
Valuable expert
Joined: Jul 23, 2005
Posts: 206
Location: Germany




Hey,

a while ago a friend coded a protection for SQL-Injection. Here it is:
Code:
function sqlprotect($str)
{
return mysql_escape_string($str);
}

I think you know how to use.
View user's profile Send private message Visit poster's website ICQ Number
You Can Do SQL Injection Here ?
www.waraxe.us Forum Index -> Sql injection
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 1 of 1

Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.029 Seconds