[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] MS Access SQL injection column enumeration
- To: Akash Shrivastava <Akash.Shri@xxxxxxxxxx>
- Subject: Re: [Full-disclosure] MS Access SQL injection column enumeration
- From: upb <upbupb@xxxxxxxxx>
- Date: Mon, 24 Oct 2005 10:25:22 +0300
U must use Ur Sr Sec.Anal.Yst skills a bit more.
If its Ur Own web application, then you know the original query.
Try combining the resulting query directly in ms access and executing it.
And Select Name, is definitely wrong...
If all the query does is SELECT 1 FROM bla WHERE user=:user AND pass=:pass U
mst Use stuff liek timing attaqs.
/BR
On 10/20/05, Akash Shrivastava <Akash.Shri@xxxxxxxxxx> wrote:
>
>
> Hi,
>
> I am trying SQL Injection on one of my own developed Web Application. This
> Application uses MS Access Database. I treid so many methods like using
> strings (', ", " OR 1=1 -- etc) as well as commands like
>
> SELECT Name, from MSysObjects where Type=1 (with or without " before
> SELECT), but all I got in return is that usrname n pwd is invalid. It
> means the query
>
> is somewhere working n not not entirely wrong. Can you please help me
> regarding this? Thanks.
>
>
> Regards,
>
> Akash Shrivastava
> Sr. IT Security Analyst,
> IBM Global Services
> EGL - C Block, Level 0,
> Off Koramangala Intermediate Ring Road,
> Bangalore
> India. 560 071
> Phone: 91-80-5192 7990
> Mobile: +91 988099 4169
> Availability: 11:00 AM - 20:00 PM IST
>
> "Great Minds don't think alike...
> But they DO think to get ahead."
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/