Jump to content

Please Try To Break My Website!

Alterlai
Go to solution Solved by ekv,
userid	username	password	voornaam	achternaam	datum3	sandervdoorn	gef5jne7/Xgrk	Sander	van Doorn	2014-12-16 12:57:021	alterlai	geUlEgVXsTYIs	Jeroen	van der Laan	2014-12-15 23:03:012	alterlai22	gerM3WvMLwDXc	jeroen	jeroen	2014-12-16 09:59:334	test	gehDQcFQQf48o	test	test	2014-12-18 13:30:488	Kiwi1	gex.wN0hUtkmQ	Kiwi	Kiwi	2015-01-03 13:07:557	Kiwi	gejZjDhkSbYuw			2015-01-03 13:06:209	wesley	ge5hTfyZUCHb.	wesley	wesley	2015-01-06 14:05:2112	linus	geLjPlfKMNfGk	Linus	Tech Tips	2015-01-27 17:51:0311	krimik	ge4CD3ujv2RhE	fdsgd	fdtgd f	2015-01-15 21:37:2114	efaefafaewefa	gebSkT/3U.3R2	ffafafawf	awfawfawfwafwa	2015-01-27 18:02:1715	somethingelse	gef5aBJffUFtY	something	else	2015-01-27 18:28:5117	');	gejPCW90MdzZg			2015-01-28 19:22:3816	asd	ge3MtKR4lXSpw	asd	asd	2015-01-27 19:47:1018	ekv'	gerLoHNyCGCEs	stefan	stefan	2015-01-29 05:36:3721	Penis	gewX71L8b7nG2	PENIS	Vagina	2015-01-30 07:47:0719	ekv	gec0h7MRomSm2	ekv	ekv	2015-01-29 05:37:2420	ekv1	gepMAKyBPbwMA	ekv1	ekv1	2015-01-29 05:37:58

This is "users" table.

Already broken it, for example, if you upload a file with %20 in the filename it will parse it, it shouldn't do that

Newb here. What does that mean and why does it happen?

Link to comment
Share on other sites

Link to post
Share on other sites

Newb here. What does that mean and why does it happen?

 

It's a URL-escaped string, meaning that special characters are encoded appropriately to appear in a URL. The escape sequence is being parsed when the file is uploaded.

Link to comment
Share on other sites

Link to post
Share on other sites

It's a URL-escaped string, meaning that special characters are encoded appropriately to appear in a URL. The escape sequence is being parsed when the file is uploaded.

%20 is 'spacebar', isn't it?

Link to comment
Share on other sites

Link to post
Share on other sites

userid	username	password	voornaam	achternaam	datum3	sandervdoorn	gef5jne7/Xgrk	Sander	van Doorn	2014-12-16 12:57:021	alterlai	geUlEgVXsTYIs	Jeroen	van der Laan	2014-12-15 23:03:012	alterlai22	gerM3WvMLwDXc	jeroen	jeroen	2014-12-16 09:59:334	test	gehDQcFQQf48o	test	test	2014-12-18 13:30:488	Kiwi1	gex.wN0hUtkmQ	Kiwi	Kiwi	2015-01-03 13:07:557	Kiwi	gejZjDhkSbYuw			2015-01-03 13:06:209	wesley	ge5hTfyZUCHb.	wesley	wesley	2015-01-06 14:05:2112	linus	geLjPlfKMNfGk	Linus	Tech Tips	2015-01-27 17:51:0311	krimik	ge4CD3ujv2RhE	fdsgd	fdtgd f	2015-01-15 21:37:2114	efaefafaewefa	gebSkT/3U.3R2	ffafafawf	awfawfawfwafwa	2015-01-27 18:02:1715	somethingelse	gef5aBJffUFtY	something	else	2015-01-27 18:28:5117	');	gejPCW90MdzZg			2015-01-28 19:22:3816	asd	ge3MtKR4lXSpw	asd	asd	2015-01-27 19:47:1018	ekv'	gerLoHNyCGCEs	stefan	stefan	2015-01-29 05:36:3721	Penis	gewX71L8b7nG2	PENIS	Vagina	2015-01-30 07:47:0719	ekv	gec0h7MRomSm2	ekv	ekv	2015-01-29 05:37:2420	ekv1	gepMAKyBPbwMA	ekv1	ekv1	2015-01-29 05:37:58

This is "users" table.

Link to comment
Share on other sites

Link to post
Share on other sites

I see you've made progress :D

I'm learning a bit of PHP now myself and have my first site up with a login and stuff made for my dad's business.

You remember that post i made a while back? :D

CPU:

Intel Core i5 2500k - Motherboard: Asus maximus iv gene-z - RAM: 2x Corsair Vengeance Blue 4GB DDR3-1600 CL9 - GPU: ASUS GTX 770 DirectCU II
Case: Coolermaster Centurion 5 II - Storage: Crucial M4 128GB, Seagate barracuda 3TB PSU: XFX 650W XXX Edition Modular PSU - Keyboard: Ducky Shine 2 Pro
Mouse: Razer Deathadder 2013 - Sound: Razer Characias
Link to comment
Share on other sites

Link to post
Share on other sites

userid	username	password	voornaam	achternaam	datum3	sandervdoorn	gef5jne7/Xgrk	Sander	van Doorn	2014-12-16 12:57:021	alterlai	geUlEgVXsTYIs	Jeroen	van der Laan	2014-12-15 23:03:012	alterlai22	gerM3WvMLwDXc	jeroen	jeroen	2014-12-16 09:59:334	test	gehDQcFQQf48o	test	test	2014-12-18 13:30:488	Kiwi1	gex.wN0hUtkmQ	Kiwi	Kiwi	2015-01-03 13:07:557	Kiwi	gejZjDhkSbYuw			2015-01-03 13:06:209	wesley	ge5hTfyZUCHb.	wesley	wesley	2015-01-06 14:05:2112	linus	geLjPlfKMNfGk	Linus	Tech Tips	2015-01-27 17:51:0311	krimik	ge4CD3ujv2RhE	fdsgd	fdtgd f	2015-01-15 21:37:2114	efaefafaewefa	gebSkT/3U.3R2	ffafafawf	awfawfawfwafwa	2015-01-27 18:02:1715	somethingelse	gef5aBJffUFtY	something	else	2015-01-27 18:28:5117	');	gejPCW90MdzZg			2015-01-28 19:22:3816	asd	ge3MtKR4lXSpw	asd	asd	2015-01-27 19:47:1018	ekv'	gerLoHNyCGCEs	stefan	stefan	2015-01-29 05:36:3721	Penis	gewX71L8b7nG2	PENIS	Vagina	2015-01-30 07:47:0719	ekv	gec0h7MRomSm2	ekv	ekv	2015-01-29 05:37:2420	ekv1	gepMAKyBPbwMA	ekv1	ekv1	2015-01-29 05:37:58

This is "users" table.

 

And no one heard from him again.  :ph34r:

Big Daddy build log:

i7 4930K @ 4.6 GHz | Corsair Obsidian Series 900D | ASUS Rampage IV Black Edition X79 | Corsair Dominator Platinum 16GB (2x8GB) DDR3-1866 CL9 | EVGA GeForce GTX780Ti Superclocked (+200/+450)
Overclock.net link: http://www.overclock.net/t/1495006/build-log-big-daddy-900d-4930k-780ti#post_22450375
Link to comment
Share on other sites

Link to post
Share on other sites

  • 1 month later...

Too bad he couldn't be bothered to share the hack.

 

As you see I shared hack before I did it. I was too lazy before, but when I seen that owner of website didn't get this seriously I made a hack.

 

Quote of the post:

 

Site is mess, sry bro, but u have low security on register/login.

Same as on delete, or other functions.

Work on design too.

827dd3c606f.png

This is SQLi i made on chaning value par. on button.

 

 

It's just sample MySQL injection on post form of delete (somthing) injection on dbid but as he made dbid & sessionid isset you must use random sessionid in injection, simple as that. :'D

At the end i told owner everything about this i think he fixed that.

Link to comment
Share on other sites

Link to post
Share on other sites

As you see I shared hack before I did it. I was too lazy before, but when I seen that owner of website didn't get this seriously I made a hack.

 

Quote of the post:

 
 

 

It's just sample MySQL injection on post form of delete (somthing) injection on dbid but as he made dbid & sessionid isset you must use random sessionid in injection, simple as that. :'D

At the end i told owner everything about this i think he fixed that.

 

Gotcha, I just didn't read the thread closely enough.

 

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×