214, 5/11 ȸ¿ø°¡ÀÔ  ·Î±×ÀΠ 
   europa8340
   sql injection ¹æ¾î ÄÚµå

http://www.hackerschool.org/HS_Boards/zboard.php?id=QNA_Web&no=275 [º¹»ç]



For i=1 To Len(AsciiStr)
  Str=AscW(Mid(AsciiStr,i,1))
  If Str<0 Then
   Str=Str+65536
  End If
  UnicodeStr=UnicodeStr&"&#"&Str&";"
Next

AsciiToUnicode=UnicodeStr
End Function

injection_i=0

For each item in Request.QueryString
        for injection_i = 1 to Request.QueryString(item).Count

        strInjection        =         strInjection & Request.QueryString(item)(injection_i)
        tmpstring                =         replace(Request.QueryString(item)(injection_i)," ","")
    if  instr(UCASE(tmpstring),"'OR")        > 0 or instr(UCASE(tmpstring),"'AND")        > 0 then
                %>
                <script>
                        alert("SQL Injection hacking[page back]");
                        history.back();
                </script>
                <%
                response.end
        end if

        strInjection        =         strInjection & item
        next
next

injection_i=0

For each item in Request.Form
        for injection_i = 1 to Request.Form(item).Count
        strInjection        =        strInjection & Request.form(item)(injection_i)

        tmpstring                =         replace(Request.form(item)(injection_i)," ","")
    if  instr(UCASE(tmpstring),"'OR")        > 0 or instr(UCASE(tmpstring),"'AND")        > 0 then
                %>
                <script>
                        alert("SQL Injection hacking[page back]");
                        history.back();
                </script>
                <%
                response.end
        end if
    strInjection        =        strInjection & item
        next
next



if instr(UCASE(strInjection),"CREATE")        > 0 or instr(UCASE(strInjection),"DELETE")>0 or instr(UCASE(strInjection),"DROP")>0 or instr(UCASE(strInjection),"UPDATE")>0 or instr(UCASE(strInjection),"SELECT")>0 or instr(UCASE(strInjection),"UNION")>0 OR  instr(UCASE(strInjection),"EXEC")>0  OR instr(UCASE(strInjection),"INSERT")>0 OR instr(UCASE(strInjection),"DECLARE")>0 or instr(UCASE(strInjection)," OR")>0 OR  instr(UCASE(strInjection)," AND")>0 OR instr(UCASE(strInjection),"--")>0 OR instr(UCASE(strInjection),"'")>0 OR instr(UCASE(strInjection),"DBCC")>0 OR instr(UCASE(strInjection),"ALTER")>0 OR instr(UCASE(strInjection),"BACKUP")>0 OR instr(UCASE(strInjection),"SET")>0 OR instr(UCASE(strInjection),"CLOSE")>0 OR instr(UCASE(strInjection),"RETURN")>0 OR instr(UCASE(strInjection),"EXISTS")>0 OR instr(UCASE(strInjection),"TRUNCATE") > 0 then


%>
<script>
        alert("Çã¿ëµÇÁö ¾Ê´Â ±ÛÀÚ°¡ Æ÷ÇԵǾî ÀÖ½À´Ï´Ù.SQL");
        history.back();
</script>
<%

response.end
end if

if     instr(UCASE(strInjection),"<SCRIPT")>0         or instr(UCASE(strInjection),"</SCRIPT")>0          or instr(UCASE(strInjection),"<HTML")>0         or instr(UCASE(strInjection),"</HTML")>0         or instr(UCASE(strInjection),"<META")>0         or instr(UCASE(strInjection),"<LINK")>0         or instr(UCASE(strInjection),"<HEAD")>0         or instr(UCASE(strInjection),"</HEAD")>0         or instr(UCASE(strInjection),"<BODY")>0         or instr(UCASE(strInjection),"</BODY")>0         or instr(UCASE(strInjection),"<FORM")>0         or instr(UCASE(strInjection),"</FORM")>0         or instr(UCASE(strInjection),"<STYLE")>0         or instr(UCASE(strInjection),"</STYLE")>0         or instr(UCASE(strInjection),"COOKIE")>0        or instr(UCASE(strInjection),"<DOCUMENT.")>0          or instr(UCASE(strInjection),"SCRIPT:")>0 or instr(UCASE(strInjection),"EMBED")>0 or instr(UCASE(strInjection),"<")>0 or instr(UCASE(strInjection),">")>0   or instr(UCASE(strInjection),"HTTP:")>0 or instr(UCASE(AsciiToUnicode(strInjection)), AsciiToUnicode("<"))>0 or instr(UCASE(AsciiToUnicode(strInjection)),AsciiToUnicode(">"))>0 or instr(UCASE(strInjection), "&#")>0        Then
%>
<script>
        alert("½ºÅ©¸³Æ®³ª HTMLű״ »ç¿ëÇÏ½Ç ¼ö ¾ø½À´Ï´Ù.");
        history.back();
</script>
<%

response.end
end if

%>
<%
        'Ư¼ö¹®ÀÚ º¯°æÇϱâ
        Function Checkot(CheckValue)
                CheckValue = replace(CheckValue, "<", "<")
                CheckValue = replace(CheckValue, ">", ">")        
                CheckValue = replace(CheckValue, "&", "&" )
                Checkot = CheckValue
        End Function

        Function Checkit(CheckValue)
                CheckValue = replace(CheckValue, "&" , "&")
                CheckValue = replace(CheckValue, "<", "<")
                CheckValue = replace(CheckValue, ">", ">")
                CheckValue = replace(CheckValue, "'", "''")
                Checkit = CheckValue
        End Function

        Function numdel(var)
                If InStr(var,".") Then
                        a = Split(var,".")(0)
                        If Len(Left(Split(var,".")(1),2)) > 1 Then
                                b = Left(Split(var,".")(1),2)
                        ElseIf Len(Left(Split(var,".")(1),2)) > 0 Then
                                b = Left(Split(var,".")(1),2) & "0"
                        Else
                                b = "00"
                        End If
                        var = a & "." & b
                Else
                        var = var & ".00"
                End If

                numdel = var
        End Function
%>

Å×½ºÆ® »çÀÌÆ® °¢ Æû¿¡¼­ ºÒ·¯¿À´Â sql injection ¹æ¾î ÀÔ´Ï´Ù.
ºÎÁ·ÇÑ°Ô ÀÖÀ»±î¿ä ?

  Hit : 2802     Date : 2019/10/04 07:19



    
ss4747 ¾È³çÇϼ¼¿ä!!

¸ðÀÇÇØÅ· °¡´ÉÀÚ ¸ðÁý ÁßÀÎ Çؿܾ÷üÀÔ´Ï´Ù

¾÷¹«ÀÇ ÁøÇà¹æ½ÄÀº ÇÁ¸®·£¼­ Çü½ÄÀ¸·Î ÀúÈñ°¡ Á¦°øÇص帰

»çÀÌÆ® ¸ðÀÇÇØÅ· ¼º°ø½Ã °Ç´ç À¸·Î Áö±ÞÇص帳´Ï´Ù

ÀÚ¼¼ÇѾȳ»»çÇ×¹× ±âŸ¹®ÀÇ´Â ÅÚ·¡±×·¥ ss4747 ¿©±â·Î ¿¬¶ôÁÖ½Ã¸é »ó¼¼ÇÏ°Ô ¾Ë·Áµå¸®°Ú½À´Ï´Ù
2019/10/08  
cd80 or ´ë½Å || ¸¸ ½áµµ ¿ìȸ µÇ´Â°Å°°Àºµð.. sqli´Â prepared statement·Î ¸·À¸½Ã´Â°Ô ÁÁ½À´Ï´Ù ÀÌ·±½ÄÀÇ ´Ü¼øºí·¢¸®½ºÆ®´Â ¿Ø¸¸ÇÏ¸é ¹«Á¶°Ç ¶Õ¸°´Ù°í »ý°¢ÇϼžßÇØ¿ä 2019/10/11  
134   webhacking.kr 30¹ø µµ¿òÁ» ÁֽǺÐ...[1]     kumi123
07/30 4521
133   webhacking.kr[1]     °¡¸é¼ÓÀǹ̼Ò
04/28 4923
132   vbscript·Î Ŭ¶óÀ̾ðÆ® ½Å·ÚÇÒ ¼ö ÀÖ´Â »çÀÌÆ® µî·Ï ÇÏ´Â ¹æ¹ýÀÌ ±Ã±ÝÇÕ´Ï´Ù     lekel09
10/10 4744
131   URLÀ» È°¿ëÇÑ Json ÆÄÀÏ APIºÐ¼®     huny606
12/24 2877
130   teleport pro Áú¹®ÀÔ´Ï´Ù.[1]     mookung
09/19 7063
129   sslstripÀ¸·Î Æ®À§ÅÍ ½º´ÏÇÎ Çغ»½ÅºÐ ÀÖ³ª¿ä?     Å×Ã÷
02/21 3354
128   sqlmap °ü·Ã¹× µ¥ÀÌÅͺ£À̽º °ü·Ã¿¡ Áú¹®ÇÕ´Ï´Ù[1]     r0ki
10/10 3382
127   sql injectionÀä[3]     kangms0801
09/03 3742
126   sql injection ½Ç½À ÇÏ·Á´Âµ¥¿ä ...¤Ð¤Ð[1]     wjscjfalsWkd1
06/20 4493
  sql injection ¹æ¾î ÄÚµå[2]     europa8340
10/04 2801
124   SQL injection ±âº»     ewqqw
03/24 3144
123   SQL Injection °ø°Ý±â¹ý Áú¹®µå¸³´Ï´Ù.[3]     kmc8724
07/03 4729
122   sql injection °ø°Ý ¿À·ù¹ÝȯÁú¹®ÀÌ¿ä.[4]     yayaja11
03/21 2790
121   sql injection °ü·ÃÇؼ­ Áú¹®ÀÔ´Ï´Ù.[2]     cdpython
07/28 3469
120   sql injection Áú¹®µå¸³´Ï´Ù.[3]     ºí·çÀ®
04/07 3387
119   sql injection Áú¹®ÀÖ½À´Ï´Ù ¿ìȸ°ü·Ã[1]     Qwed_na
09/04 3465
118   SQL Injection[5]     ka0r1
04/14 3619
117   shell ¿¡ ´ëÇØ ¼³¸íÁ» ÇØÁÖ¼¼¿ä![1]     v_0_0v_
06/04 3321
116   sessionid´Â ¾î¶²Á¾·ùÀÇ ¾ÏÈ£·Î ÀÎÄÚµù µÇ´Â°Ç°¡¿ä?[2]     kangms0801
04/03 4815
115   Session º¯¼ö Á¶ÀÛ°ú IP ´ëÁ¶º¸¾È ÀÎÁõ Åë°ú°¡ °¡´ÉÇÑ°¡¿ä ?[1]     $Zero
03/24 3368
[1][2][3][4] 5 [6][7][8][9][10]..[11]

Copyright 1999-2024 Zeroboard / skin by Hackerschool.org / Secure Patch by Hackerschool.org