214, 10/11 ȸ¿ø°¡ÀÔ  ·Î±×ÀΠ 
   europa8340
   sql injection ¹æ¾î ÄÚµå

http://www.hackerschool.org/HS_Boards/zboard.php?id=QNA_Web&no=275 [º¹»ç]



For i=1 To Len(AsciiStr)
  Str=AscW(Mid(AsciiStr,i,1))
  If Str<0 Then
   Str=Str+65536
  End If
  UnicodeStr=UnicodeStr&"&#"&Str&";"
Next

AsciiToUnicode=UnicodeStr
End Function

injection_i=0

For each item in Request.QueryString
        for injection_i = 1 to Request.QueryString(item).Count

        strInjection        =         strInjection & Request.QueryString(item)(injection_i)
        tmpstring                =         replace(Request.QueryString(item)(injection_i)," ","")
    if  instr(UCASE(tmpstring),"'OR")        > 0 or instr(UCASE(tmpstring),"'AND")        > 0 then
                %>
                <script>
                        alert("SQL Injection hacking[page back]");
                        history.back();
                </script>
                <%
                response.end
        end if

        strInjection        =         strInjection & item
        next
next

injection_i=0

For each item in Request.Form
        for injection_i = 1 to Request.Form(item).Count
        strInjection        =        strInjection & Request.form(item)(injection_i)

        tmpstring                =         replace(Request.form(item)(injection_i)," ","")
    if  instr(UCASE(tmpstring),"'OR")        > 0 or instr(UCASE(tmpstring),"'AND")        > 0 then
                %>
                <script>
                        alert("SQL Injection hacking[page back]");
                        history.back();
                </script>
                <%
                response.end
        end if
    strInjection        =        strInjection & item
        next
next



if instr(UCASE(strInjection),"CREATE")        > 0 or instr(UCASE(strInjection),"DELETE")>0 or instr(UCASE(strInjection),"DROP")>0 or instr(UCASE(strInjection),"UPDATE")>0 or instr(UCASE(strInjection),"SELECT")>0 or instr(UCASE(strInjection),"UNION")>0 OR  instr(UCASE(strInjection),"EXEC")>0  OR instr(UCASE(strInjection),"INSERT")>0 OR instr(UCASE(strInjection),"DECLARE")>0 or instr(UCASE(strInjection)," OR")>0 OR  instr(UCASE(strInjection)," AND")>0 OR instr(UCASE(strInjection),"--")>0 OR instr(UCASE(strInjection),"'")>0 OR instr(UCASE(strInjection),"DBCC")>0 OR instr(UCASE(strInjection),"ALTER")>0 OR instr(UCASE(strInjection),"BACKUP")>0 OR instr(UCASE(strInjection),"SET")>0 OR instr(UCASE(strInjection),"CLOSE")>0 OR instr(UCASE(strInjection),"RETURN")>0 OR instr(UCASE(strInjection),"EXISTS")>0 OR instr(UCASE(strInjection),"TRUNCATE") > 0 then


%>
<script>
        alert("Çã¿ëµÇÁö ¾Ê´Â ±ÛÀÚ°¡ Æ÷ÇԵǾî ÀÖ½À´Ï´Ù.SQL");
        history.back();
</script>
<%

response.end
end if

if     instr(UCASE(strInjection),"<SCRIPT")>0         or instr(UCASE(strInjection),"</SCRIPT")>0          or instr(UCASE(strInjection),"<HTML")>0         or instr(UCASE(strInjection),"</HTML")>0         or instr(UCASE(strInjection),"<META")>0         or instr(UCASE(strInjection),"<LINK")>0         or instr(UCASE(strInjection),"<HEAD")>0         or instr(UCASE(strInjection),"</HEAD")>0         or instr(UCASE(strInjection),"<BODY")>0         or instr(UCASE(strInjection),"</BODY")>0         or instr(UCASE(strInjection),"<FORM")>0         or instr(UCASE(strInjection),"</FORM")>0         or instr(UCASE(strInjection),"<STYLE")>0         or instr(UCASE(strInjection),"</STYLE")>0         or instr(UCASE(strInjection),"COOKIE")>0        or instr(UCASE(strInjection),"<DOCUMENT.")>0          or instr(UCASE(strInjection),"SCRIPT:")>0 or instr(UCASE(strInjection),"EMBED")>0 or instr(UCASE(strInjection),"<")>0 or instr(UCASE(strInjection),">")>0   or instr(UCASE(strInjection),"HTTP:")>0 or instr(UCASE(AsciiToUnicode(strInjection)), AsciiToUnicode("<"))>0 or instr(UCASE(AsciiToUnicode(strInjection)),AsciiToUnicode(">"))>0 or instr(UCASE(strInjection), "&#")>0        Then
%>
<script>
        alert("½ºÅ©¸³Æ®³ª HTMLű״ »ç¿ëÇÏ½Ç ¼ö ¾ø½À´Ï´Ù.");
        history.back();
</script>
<%

response.end
end if

%>
<%
        'Ư¼ö¹®ÀÚ º¯°æÇϱâ
        Function Checkot(CheckValue)
                CheckValue = replace(CheckValue, "<", "<")
                CheckValue = replace(CheckValue, ">", ">")        
                CheckValue = replace(CheckValue, "&", "&" )
                Checkot = CheckValue
        End Function

        Function Checkit(CheckValue)
                CheckValue = replace(CheckValue, "&" , "&")
                CheckValue = replace(CheckValue, "<", "<")
                CheckValue = replace(CheckValue, ">", ">")
                CheckValue = replace(CheckValue, "'", "''")
                Checkit = CheckValue
        End Function

        Function numdel(var)
                If InStr(var,".") Then
                        a = Split(var,".")(0)
                        If Len(Left(Split(var,".")(1),2)) > 1 Then
                                b = Left(Split(var,".")(1),2)
                        ElseIf Len(Left(Split(var,".")(1),2)) > 0 Then
                                b = Left(Split(var,".")(1),2) & "0"
                        Else
                                b = "00"
                        End If
                        var = a & "." & b
                Else
                        var = var & ".00"
                End If

                numdel = var
        End Function
%>

Å×½ºÆ® »çÀÌÆ® °¢ Æû¿¡¼­ ºÒ·¯¿À´Â sql injection ¹æ¾î ÀÔ´Ï´Ù.
ºÎÁ·ÇÑ°Ô ÀÖÀ»±î¿ä ?

  Hit : 2812     Date : 2019/10/04 07:19



    
ss4747 ¾È³çÇϼ¼¿ä!!

¸ðÀÇÇØÅ· °¡´ÉÀÚ ¸ðÁý ÁßÀÎ Çؿܾ÷üÀÔ´Ï´Ù

¾÷¹«ÀÇ ÁøÇà¹æ½ÄÀº ÇÁ¸®·£¼­ Çü½ÄÀ¸·Î ÀúÈñ°¡ Á¦°øÇص帰

»çÀÌÆ® ¸ðÀÇÇØÅ· ¼º°ø½Ã °Ç´ç À¸·Î Áö±ÞÇص帳´Ï´Ù

ÀÚ¼¼ÇѾȳ»»çÇ×¹× ±âŸ¹®ÀÇ´Â ÅÚ·¡±×·¥ ss4747 ¿©±â·Î ¿¬¶ôÁÖ½Ã¸é »ó¼¼ÇÏ°Ô ¾Ë·Áµå¸®°Ú½À´Ï´Ù
2019/10/08  
cd80 or ´ë½Å || ¸¸ ½áµµ ¿ìȸ µÇ´Â°Å°°Àºµð.. sqli´Â prepared statement·Î ¸·À¸½Ã´Â°Ô ÁÁ½À´Ï´Ù ÀÌ·±½ÄÀÇ ´Ü¼øºí·¢¸®½ºÆ®´Â ¿Ø¸¸ÇÏ¸é ¹«Á¶°Ç ¶Õ¸°´Ù°í »ý°¢ÇϼžßÇØ¿ä 2019/10/11  
34   ¾È³çÇϼ¼¿ä ! ¿À´Ã°¡ÀÔÇߴµ¥! ¹è¿ö¾ßÇÒ°ÍÁ» °¡¸£ÃÄÁÖ¼¼¿ä![1]     parani03
04/08 3001
33   À¥ ÇØÅ· ÀÚ½ÅÀÖÀ¸½Å ºÐµé ²À ºÁÁÖ¼¼¿ä     bird999
12/05 2965
32   Áú¹®ÀÌ¿ä!![1]     sophiz
01/06 2896
31   À¥ ÇØ Å· °¡´ÉÇÏ´Â[1]     custom890
12/31 2886
30   URLÀ» È°¿ëÇÑ Json ÆÄÀÏ APIºÐ¼®     huny606
12/24 2883
29   À¥ÇØÅ· ÀÔ¹®ÇÒ·Á°íÇÕ´Ï´Ù. Á¶¾ð¹×°ú¿ÜÇØÁֽǽº½Â´Ô ±¸ÇÕ´Ï´õ[3]     edustars
09/26 2872
28   ÇÁ·Ï½Ã ÇÁ·Î±×·¥ÀÌ ¾ÈµË´Ï´Ù[1]     yayaja11
03/05 2850
27   WPA2/PSK °ü·Ã Áú¹®ÀÌ ÀÖ½À´Ï´Ù.     roccafort
04/30 2829
26   ÄíÅ°¹®ÀÇ[3]     sm8303
04/21 2824
25   À¥ÇØÅ· Áú¹®[1]     ericseo16
10/14 2824
  sql injection ¹æ¾î ÄÚµå[2]     europa8340
10/04 2811
23   HTTP Çì´õ[1]     chaneyoon
04/30 2803
22   ¹ö±× ¹Ù¿îƼ ±âÃÊ     wwwlk
06/27 2799
21   sql injection °ø°Ý ¿À·ù¹ÝȯÁú¹®ÀÌ¿ä.[4]     yayaja11
03/21 2796
20   À¥ ÇØÅ· Çϴµ¥ À¥ °³¹ßµµ ÇÒ ÁÙ ¾Ë¾Æ¾ß Çϳª¿ä?[1]     unmask
10/25 2788
19   Áú¹®ÀÔ´Ï´Ù.     jsw2604
12/27 2779
18   À¥ ÇØÅ· Áú¹®ÀÔ´Ï´Ù.     dsgoidsog
11/26 2763
17   get method ¿¡ °üÇÑ Áú¹®[1]     ewqqw
03/13 2755
16   Webhacking.kr ¹®Á¦¸¦ Ç®´Ù°¡..     alstnsms67
08/02 2697
15   cookie °ü·Ã[1]     ewqqw
03/23 2683
[1][2][3][4][5][6][7][8][9] 10 ..[11]

Copyright 1999-2024 Zeroboard / skin by Hackerschool.org / Secure Patch by Hackerschool.org