214, 1/11 ȸ¿ø°¡ÀÔ  ·Î±×ÀΠ 
   europa8340
   sql injection ¹æ¾î ÄÚµå

http://www.hackerschool.org/HS_Boards/zboard.php?id=QNA_Web&no=275 [º¹»ç]



For i=1 To Len(AsciiStr)
  Str=AscW(Mid(AsciiStr,i,1))
  If Str<0 Then
   Str=Str+65536
  End If
  UnicodeStr=UnicodeStr&"&#"&Str&";"
Next

AsciiToUnicode=UnicodeStr
End Function

injection_i=0

For each item in Request.QueryString
        for injection_i = 1 to Request.QueryString(item).Count

        strInjection        =         strInjection & Request.QueryString(item)(injection_i)
        tmpstring                =         replace(Request.QueryString(item)(injection_i)," ","")
    if  instr(UCASE(tmpstring),"'OR")        > 0 or instr(UCASE(tmpstring),"'AND")        > 0 then
                %>
                <script>
                        alert("SQL Injection hacking[page back]");
                        history.back();
                </script>
                <%
                response.end
        end if

        strInjection        =         strInjection & item
        next
next

injection_i=0

For each item in Request.Form
        for injection_i = 1 to Request.Form(item).Count
        strInjection        =        strInjection & Request.form(item)(injection_i)

        tmpstring                =         replace(Request.form(item)(injection_i)," ","")
    if  instr(UCASE(tmpstring),"'OR")        > 0 or instr(UCASE(tmpstring),"'AND")        > 0 then
                %>
                <script>
                        alert("SQL Injection hacking[page back]");
                        history.back();
                </script>
                <%
                response.end
        end if
    strInjection        =        strInjection & item
        next
next



if instr(UCASE(strInjection),"CREATE")        > 0 or instr(UCASE(strInjection),"DELETE")>0 or instr(UCASE(strInjection),"DROP")>0 or instr(UCASE(strInjection),"UPDATE")>0 or instr(UCASE(strInjection),"SELECT")>0 or instr(UCASE(strInjection),"UNION")>0 OR  instr(UCASE(strInjection),"EXEC")>0  OR instr(UCASE(strInjection),"INSERT")>0 OR instr(UCASE(strInjection),"DECLARE")>0 or instr(UCASE(strInjection)," OR")>0 OR  instr(UCASE(strInjection)," AND")>0 OR instr(UCASE(strInjection),"--")>0 OR instr(UCASE(strInjection),"'")>0 OR instr(UCASE(strInjection),"DBCC")>0 OR instr(UCASE(strInjection),"ALTER")>0 OR instr(UCASE(strInjection),"BACKUP")>0 OR instr(UCASE(strInjection),"SET")>0 OR instr(UCASE(strInjection),"CLOSE")>0 OR instr(UCASE(strInjection),"RETURN")>0 OR instr(UCASE(strInjection),"EXISTS")>0 OR instr(UCASE(strInjection),"TRUNCATE") > 0 then


%>
<script>
        alert("Çã¿ëµÇÁö ¾Ê´Â ±ÛÀÚ°¡ Æ÷ÇԵǾî ÀÖ½À´Ï´Ù.SQL");
        history.back();
</script>
<%

response.end
end if

if     instr(UCASE(strInjection),"<SCRIPT")>0         or instr(UCASE(strInjection),"</SCRIPT")>0          or instr(UCASE(strInjection),"<HTML")>0         or instr(UCASE(strInjection),"</HTML")>0         or instr(UCASE(strInjection),"<META")>0         or instr(UCASE(strInjection),"<LINK")>0         or instr(UCASE(strInjection),"<HEAD")>0         or instr(UCASE(strInjection),"</HEAD")>0         or instr(UCASE(strInjection),"<BODY")>0         or instr(UCASE(strInjection),"</BODY")>0         or instr(UCASE(strInjection),"<FORM")>0         or instr(UCASE(strInjection),"</FORM")>0         or instr(UCASE(strInjection),"<STYLE")>0         or instr(UCASE(strInjection),"</STYLE")>0         or instr(UCASE(strInjection),"COOKIE")>0        or instr(UCASE(strInjection),"<DOCUMENT.")>0          or instr(UCASE(strInjection),"SCRIPT:")>0 or instr(UCASE(strInjection),"EMBED")>0 or instr(UCASE(strInjection),"<")>0 or instr(UCASE(strInjection),">")>0   or instr(UCASE(strInjection),"HTTP:")>0 or instr(UCASE(AsciiToUnicode(strInjection)), AsciiToUnicode("<"))>0 or instr(UCASE(AsciiToUnicode(strInjection)),AsciiToUnicode(">"))>0 or instr(UCASE(strInjection), "&#")>0        Then
%>
<script>
        alert("½ºÅ©¸³Æ®³ª HTMLű״ »ç¿ëÇÏ½Ç ¼ö ¾ø½À´Ï´Ù.");
        history.back();
</script>
<%

response.end
end if

%>
<%
        'Ư¼ö¹®ÀÚ º¯°æÇϱâ
        Function Checkot(CheckValue)
                CheckValue = replace(CheckValue, "<", "<")
                CheckValue = replace(CheckValue, ">", ">")        
                CheckValue = replace(CheckValue, "&", "&" )
                Checkot = CheckValue
        End Function

        Function Checkit(CheckValue)
                CheckValue = replace(CheckValue, "&" , "&")
                CheckValue = replace(CheckValue, "<", "<")
                CheckValue = replace(CheckValue, ">", ">")
                CheckValue = replace(CheckValue, "'", "''")
                Checkit = CheckValue
        End Function

        Function numdel(var)
                If InStr(var,".") Then
                        a = Split(var,".")(0)
                        If Len(Left(Split(var,".")(1),2)) > 1 Then
                                b = Left(Split(var,".")(1),2)
                        ElseIf Len(Left(Split(var,".")(1),2)) > 0 Then
                                b = Left(Split(var,".")(1),2) & "0"
                        Else
                                b = "00"
                        End If
                        var = a & "." & b
                Else
                        var = var & ".00"
                End If

                numdel = var
        End Function
%>

Å×½ºÆ® »çÀÌÆ® °¢ Æû¿¡¼­ ºÒ·¯¿À´Â sql injection ¹æ¾î ÀÔ´Ï´Ù.
ºÎÁ·ÇÑ°Ô ÀÖÀ»±î¿ä ?

  Hit : 2782     Date : 2019/10/04 07:19



    
ss4747 ¾È³çÇϼ¼¿ä!!

¸ðÀÇÇØÅ· °¡´ÉÀÚ ¸ðÁý ÁßÀÎ Çؿܾ÷üÀÔ´Ï´Ù

¾÷¹«ÀÇ ÁøÇà¹æ½ÄÀº ÇÁ¸®·£¼­ Çü½ÄÀ¸·Î ÀúÈñ°¡ Á¦°øÇص帰

»çÀÌÆ® ¸ðÀÇÇØÅ· ¼º°ø½Ã °Ç´ç À¸·Î Áö±ÞÇص帳´Ï´Ù

ÀÚ¼¼ÇѾȳ»»çÇ×¹× ±âŸ¹®ÀÇ´Â ÅÚ·¡±×·¥ ss4747 ¿©±â·Î ¿¬¶ôÁÖ½Ã¸é »ó¼¼ÇÏ°Ô ¾Ë·Áµå¸®°Ú½À´Ï´Ù
2019/10/08  
cd80 or ´ë½Å || ¸¸ ½áµµ ¿ìȸ µÇ´Â°Å°°Àºµð.. sqli´Â prepared statement·Î ¸·À¸½Ã´Â°Ô ÁÁ½À´Ï´Ù ÀÌ·±½ÄÀÇ ´Ü¼øºí·¢¸®½ºÆ®´Â ¿Ø¸¸ÇÏ¸é ¹«Á¶°Ç ¶Õ¸°´Ù°í »ý°¢ÇϼžßÇØ¿ä 2019/10/11  
214   CloudFlare ¾²´Â »çÀÌÆ®´Â ÇØÅ·Çϱâ Èûµé±î¿ä?[3]     sogreat
03/21 149
213   À¥ÇØÅ· °ü·ÃÇÏ¿© Áú¹®µå¸³´Ï´Ù[5]     solo20
05/21 2333
212   À¥ÇØÅ· ÀÔ¹® Ã¥ÃßõÇØÁÖ¼¼¿ä     kjwp1
02/24 2484
211   À̹ÌÁö¾È¿¡ ¸®´ÙÀÌ·ºÆ® ¼Ò½º(¾Ç¿ë¸ñÀûX)[2]     tjdgus1515
12/06 4604
210   ¾ÆÆÄÄ¡ php mysql ¿¬µ¿°ü·Ã Áú¹®ÀÔ´Ï´Ù.[3]     Ä¿¼¼¾î
10/19 3560
  sql injection ¹æ¾î ÄÚµå[2]     europa8340
10/04 2781
208   À¥ sqlmap Áß¿¡[1]     europa8340
07/26 2231
207   À¥ ÇØ Å· °¡´ÉÇÏ´Â[1]     custom890
12/31 2869
206   À¥ ÇØÅ· ÀÚ½ÅÀÖÀ¸½Å ºÐµé ²À ºÁÁÖ¼¼¿ä     bird999
12/05 2944
205   À¥ ÇØÅ· Çϴµ¥ À¥ °³¹ßµµ ÇÒ ÁÙ ¾Ë¾Æ¾ß Çϳª¿ä?[1]     unmask
10/25 2768
204   ÇØÅ·¸Àº¸±â(¼­Àû) ¾ÆÆÄÄ¡ÇÁ·Î±×·¥ Áú¹®ÀÔ´Ï´Ù[1]     Ä¿¼¼¾î
09/29 2624
203   À¥ÇØÅ· ÀÔ¹®ÇÒ·Á°íÇÕ´Ï´Ù. Á¶¾ð¹×°ú¿ÜÇØÁֽǽº½Â´Ô ±¸ÇÕ´Ï´õ[3]     edustars
09/26 2849
202   417 error     wiwiwi79
08/15 2493
201   ȨÆäÀÌÁö µðµµ½º ¿ø¸®?[1]     tbxmaos
02/12 2638
200   ¾ÆÆÄÄ¡ ¼³Á¤Áß ¿À·ù[2]     eunjong147
02/06 8362
199   Ä®¸®¸®´ª½º dvwa ¼³Ä¡°úÁ¤Áß ¿À·ù[2]     wnsdud5534
01/23 3390
198   À¥ ÇØÅ· Áú¹®ÀÔ´Ï´Ù.     dsgoidsog
11/26 2735
197   XSS <> ġȯ ¿ìȸ°¡ °¡´ÉÇÑ°¡¿ä?[2]     drrobot333
11/19 3582
196   PHP¿¡¼­ À̸ÞÀÏ Àü¼ÛÇÒ¶§ °¡·Îç ¼ö ÀÖ³ª¿ä?[9]     drrobot333
11/16 2554
195   À¥ÇØÅ· Áú¹®[1]     ericseo16
10/14 2805
1 [2][3][4][5][6][7][8][9][10]..[11]

Copyright 1999-2024 Zeroboard / skin by Hackerschool.org / Secure Patch by Hackerschool.org