214, 3/11 ȸ¿ø°¡ÀÔ  ·Î±×ÀΠ 
   europa8340
   sql injection ¹æ¾î ÄÚµå

http://www.hackerschool.org/HS_Boards/zboard.php?id=QNA_Web&no=275 [º¹»ç]



For i=1 To Len(AsciiStr)
  Str=AscW(Mid(AsciiStr,i,1))
  If Str<0 Then
   Str=Str+65536
  End If
  UnicodeStr=UnicodeStr&"&#"&Str&";"
Next

AsciiToUnicode=UnicodeStr
End Function

injection_i=0

For each item in Request.QueryString
        for injection_i = 1 to Request.QueryString(item).Count

        strInjection        =         strInjection & Request.QueryString(item)(injection_i)
        tmpstring                =         replace(Request.QueryString(item)(injection_i)," ","")
    if  instr(UCASE(tmpstring),"'OR")        > 0 or instr(UCASE(tmpstring),"'AND")        > 0 then
                %>
                <script>
                        alert("SQL Injection hacking[page back]");
                        history.back();
                </script>
                <%
                response.end
        end if

        strInjection        =         strInjection & item
        next
next

injection_i=0

For each item in Request.Form
        for injection_i = 1 to Request.Form(item).Count
        strInjection        =        strInjection & Request.form(item)(injection_i)

        tmpstring                =         replace(Request.form(item)(injection_i)," ","")
    if  instr(UCASE(tmpstring),"'OR")        > 0 or instr(UCASE(tmpstring),"'AND")        > 0 then
                %>
                <script>
                        alert("SQL Injection hacking[page back]");
                        history.back();
                </script>
                <%
                response.end
        end if
    strInjection        =        strInjection & item
        next
next



if instr(UCASE(strInjection),"CREATE")        > 0 or instr(UCASE(strInjection),"DELETE")>0 or instr(UCASE(strInjection),"DROP")>0 or instr(UCASE(strInjection),"UPDATE")>0 or instr(UCASE(strInjection),"SELECT")>0 or instr(UCASE(strInjection),"UNION")>0 OR  instr(UCASE(strInjection),"EXEC")>0  OR instr(UCASE(strInjection),"INSERT")>0 OR instr(UCASE(strInjection),"DECLARE")>0 or instr(UCASE(strInjection)," OR")>0 OR  instr(UCASE(strInjection)," AND")>0 OR instr(UCASE(strInjection),"--")>0 OR instr(UCASE(strInjection),"'")>0 OR instr(UCASE(strInjection),"DBCC")>0 OR instr(UCASE(strInjection),"ALTER")>0 OR instr(UCASE(strInjection),"BACKUP")>0 OR instr(UCASE(strInjection),"SET")>0 OR instr(UCASE(strInjection),"CLOSE")>0 OR instr(UCASE(strInjection),"RETURN")>0 OR instr(UCASE(strInjection),"EXISTS")>0 OR instr(UCASE(strInjection),"TRUNCATE") > 0 then


%>
<script>
        alert("Çã¿ëµÇÁö ¾Ê´Â ±ÛÀÚ°¡ Æ÷ÇԵǾî ÀÖ½À´Ï´Ù.SQL");
        history.back();
</script>
<%

response.end
end if

if     instr(UCASE(strInjection),"<SCRIPT")>0         or instr(UCASE(strInjection),"</SCRIPT")>0          or instr(UCASE(strInjection),"<HTML")>0         or instr(UCASE(strInjection),"</HTML")>0         or instr(UCASE(strInjection),"<META")>0         or instr(UCASE(strInjection),"<LINK")>0         or instr(UCASE(strInjection),"<HEAD")>0         or instr(UCASE(strInjection),"</HEAD")>0         or instr(UCASE(strInjection),"<BODY")>0         or instr(UCASE(strInjection),"</BODY")>0         or instr(UCASE(strInjection),"<FORM")>0         or instr(UCASE(strInjection),"</FORM")>0         or instr(UCASE(strInjection),"<STYLE")>0         or instr(UCASE(strInjection),"</STYLE")>0         or instr(UCASE(strInjection),"COOKIE")>0        or instr(UCASE(strInjection),"<DOCUMENT.")>0          or instr(UCASE(strInjection),"SCRIPT:")>0 or instr(UCASE(strInjection),"EMBED")>0 or instr(UCASE(strInjection),"<")>0 or instr(UCASE(strInjection),">")>0   or instr(UCASE(strInjection),"HTTP:")>0 or instr(UCASE(AsciiToUnicode(strInjection)), AsciiToUnicode("<"))>0 or instr(UCASE(AsciiToUnicode(strInjection)),AsciiToUnicode(">"))>0 or instr(UCASE(strInjection), "&#")>0        Then
%>
<script>
        alert("½ºÅ©¸³Æ®³ª HTMLű״ »ç¿ëÇÏ½Ç ¼ö ¾ø½À´Ï´Ù.");
        history.back();
</script>
<%

response.end
end if

%>
<%
        'Ư¼ö¹®ÀÚ º¯°æÇϱâ
        Function Checkot(CheckValue)
                CheckValue = replace(CheckValue, "<", "<")
                CheckValue = replace(CheckValue, ">", ">")        
                CheckValue = replace(CheckValue, "&", "&" )
                Checkot = CheckValue
        End Function

        Function Checkit(CheckValue)
                CheckValue = replace(CheckValue, "&" , "&")
                CheckValue = replace(CheckValue, "<", "<")
                CheckValue = replace(CheckValue, ">", ">")
                CheckValue = replace(CheckValue, "'", "''")
                Checkit = CheckValue
        End Function

        Function numdel(var)
                If InStr(var,".") Then
                        a = Split(var,".")(0)
                        If Len(Left(Split(var,".")(1),2)) > 1 Then
                                b = Left(Split(var,".")(1),2)
                        ElseIf Len(Left(Split(var,".")(1),2)) > 0 Then
                                b = Left(Split(var,".")(1),2) & "0"
                        Else
                                b = "00"
                        End If
                        var = a & "." & b
                Else
                        var = var & ".00"
                End If

                numdel = var
        End Function
%>

Å×½ºÆ® »çÀÌÆ® °¢ Æû¿¡¼­ ºÒ·¯¿À´Â sql injection ¹æ¾î ÀÔ´Ï´Ù.
ºÎÁ·ÇÑ°Ô ÀÖÀ»±î¿ä ?

  Hit : 2836     Date : 2019/10/04 07:19



    
ss4747 ¾È³çÇϼ¼¿ä!!

¸ðÀÇÇØÅ· °¡´ÉÀÚ ¸ðÁý ÁßÀÎ Çؿܾ÷üÀÔ´Ï´Ù

¾÷¹«ÀÇ ÁøÇà¹æ½ÄÀº ÇÁ¸®·£¼­ Çü½ÄÀ¸·Î ÀúÈñ°¡ Á¦°øÇص帰

»çÀÌÆ® ¸ðÀÇÇØÅ· ¼º°ø½Ã °Ç´ç À¸·Î Áö±ÞÇص帳´Ï´Ù

ÀÚ¼¼ÇѾȳ»»çÇ×¹× ±âŸ¹®ÀÇ´Â ÅÚ·¡±×·¥ ss4747 ¿©±â·Î ¿¬¶ôÁÖ½Ã¸é »ó¼¼ÇÏ°Ô ¾Ë·Áµå¸®°Ú½À´Ï´Ù
2019/10/08  
cd80 or ´ë½Å || ¸¸ ½áµµ ¿ìȸ µÇ´Â°Å°°Àºµð.. sqli´Â prepared statement·Î ¸·À¸½Ã´Â°Ô ÁÁ½À´Ï´Ù ÀÌ·±½ÄÀÇ ´Ü¼øºí·¢¸®½ºÆ®´Â ¿Ø¸¸ÇÏ¸é ¹«Á¶°Ç ¶Õ¸°´Ù°í »ý°¢ÇϼžßÇØ¿ä 2019/10/11  
174   ../ °æ·Î¿¡ ´ëÇÑ Áú¹®[1]     daydreamss
07/09 3183
173   ÀÌ Á¶°Ç¿¡¼­ sql injectionÀÌ °¡´ÉÇÑ°¡°¡ ±Ã±ÝÇÕ´Ï´Ù.[2]     dbman
05/16 3478
172   »ó´ë¹æ¿¡°Ô URLÀ» º¸³»´Â ¹æ¹ý[1]     ddr4869
01/20 3703
171   load of sql injectinÀ» Ç®±¸ÀÖ½À´Ï´Ù..[3]     deadbeef
02/15 3800
170   ÀÌ°Ô À¥ÇØÅ·°ú °ü·ÃÀִ°ÇÁö ¸ð¸£°ÚÁö¸¸¿ä[2]     dldduzo11
05/31 3623
169   À¥ÇØÅ· °øºÎ ¼ø¼­¿¡ °üÇÑ Áú¹®ÀÔ´Ï´Ù..[1]     dlrjsdn963
07/27 4201
168   PHP¿¡¼­ À̸ÞÀÏ Àü¼ÛÇÒ¶§ °¡·Îç ¼ö ÀÖ³ª¿ä?[9]     drrobot333
11/16 2596
167   XSS <> ġȯ ¿ìȸ°¡ °¡´ÉÇÑ°¡¿ä?[2]     drrobot333
11/19 3630
166   À¥ ÇØÅ· Áú¹®ÀÔ´Ï´Ù.     dsgoidsog
11/26 2782
165   False Injection¿¡ °üÇÑ Áú¹®ÀÔ´Ï´Ù.[3]     dudtntdud
01/18 2649
164   Ä®¸®¸®´ª½º À¥ Ãë¾àÁ¡ Á¡°Ë ½ºÄ³³Ê Áú¹®..     duwkakstp1
08/21 4108
163   À¥ÇØÅ·À» ¹è¿ì°í½Í½À´Ï´Ù..[2]     edustars
05/24 3585
162   À¥ÇØÅ· ÀÔ¹®ÇÒ·Á°íÇÕ´Ï´Ù. Á¶¾ð¹×°ú¿ÜÇØÁֽǽº½Â´Ô ±¸ÇÕ´Ï´õ[3]     edustars
09/26 2887
161   °øÀÎIP, »ç¼³IP[2]     ehdgns3136
11/06 3879
160   À¥ÇØÅ· Áú¹®[1]     ericseo16
10/14 2847
159   ¾ÆÆÄÄ¡ ¼³Á¤Áß ¿À·ù[2]     eunjong147
02/06 8422
158   À¥ sqlmap Áß¿¡[1]     europa8340
07/26 2274
  sql injection ¹æ¾î ÄÚµå[2]     europa8340
10/04 2835
156   get method ¿¡ °üÇÑ Áú¹®[1]     ewqqw
03/13 2775
155   POST METHOD     ewqqw
03/13 2420
[1][2] 3 [4][5][6][7][8][9][10]..[11]

Copyright 1999-2024 Zeroboard / skin by Hackerschool.org / Secure Patch by Hackerschool.org