214, 8/11 ȸ¿ø°¡ÀÔ  ·Î±×ÀΠ 
   europa8340
   sql injection ¹æ¾î ÄÚµå

http://www.hackerschool.org/HS_Boards/zboard.php?id=QNA_Web&no=275 [º¹»ç]



For i=1 To Len(AsciiStr)
  Str=AscW(Mid(AsciiStr,i,1))
  If Str<0 Then
   Str=Str+65536
  End If
  UnicodeStr=UnicodeStr&"&#"&Str&";"
Next

AsciiToUnicode=UnicodeStr
End Function

injection_i=0

For each item in Request.QueryString
        for injection_i = 1 to Request.QueryString(item).Count

        strInjection        =         strInjection & Request.QueryString(item)(injection_i)
        tmpstring                =         replace(Request.QueryString(item)(injection_i)," ","")
    if  instr(UCASE(tmpstring),"'OR")        > 0 or instr(UCASE(tmpstring),"'AND")        > 0 then
                %>
                <script>
                        alert("SQL Injection hacking[page back]");
                        history.back();
                </script>
                <%
                response.end
        end if

        strInjection        =         strInjection & item
        next
next

injection_i=0

For each item in Request.Form
        for injection_i = 1 to Request.Form(item).Count
        strInjection        =        strInjection & Request.form(item)(injection_i)

        tmpstring                =         replace(Request.form(item)(injection_i)," ","")
    if  instr(UCASE(tmpstring),"'OR")        > 0 or instr(UCASE(tmpstring),"'AND")        > 0 then
                %>
                <script>
                        alert("SQL Injection hacking[page back]");
                        history.back();
                </script>
                <%
                response.end
        end if
    strInjection        =        strInjection & item
        next
next



if instr(UCASE(strInjection),"CREATE")        > 0 or instr(UCASE(strInjection),"DELETE")>0 or instr(UCASE(strInjection),"DROP")>0 or instr(UCASE(strInjection),"UPDATE")>0 or instr(UCASE(strInjection),"SELECT")>0 or instr(UCASE(strInjection),"UNION")>0 OR  instr(UCASE(strInjection),"EXEC")>0  OR instr(UCASE(strInjection),"INSERT")>0 OR instr(UCASE(strInjection),"DECLARE")>0 or instr(UCASE(strInjection)," OR")>0 OR  instr(UCASE(strInjection)," AND")>0 OR instr(UCASE(strInjection),"--")>0 OR instr(UCASE(strInjection),"'")>0 OR instr(UCASE(strInjection),"DBCC")>0 OR instr(UCASE(strInjection),"ALTER")>0 OR instr(UCASE(strInjection),"BACKUP")>0 OR instr(UCASE(strInjection),"SET")>0 OR instr(UCASE(strInjection),"CLOSE")>0 OR instr(UCASE(strInjection),"RETURN")>0 OR instr(UCASE(strInjection),"EXISTS")>0 OR instr(UCASE(strInjection),"TRUNCATE") > 0 then


%>
<script>
        alert("Çã¿ëµÇÁö ¾Ê´Â ±ÛÀÚ°¡ Æ÷ÇԵǾî ÀÖ½À´Ï´Ù.SQL");
        history.back();
</script>
<%

response.end
end if

if     instr(UCASE(strInjection),"<SCRIPT")>0         or instr(UCASE(strInjection),"</SCRIPT")>0          or instr(UCASE(strInjection),"<HTML")>0         or instr(UCASE(strInjection),"</HTML")>0         or instr(UCASE(strInjection),"<META")>0         or instr(UCASE(strInjection),"<LINK")>0         or instr(UCASE(strInjection),"<HEAD")>0         or instr(UCASE(strInjection),"</HEAD")>0         or instr(UCASE(strInjection),"<BODY")>0         or instr(UCASE(strInjection),"</BODY")>0         or instr(UCASE(strInjection),"<FORM")>0         or instr(UCASE(strInjection),"</FORM")>0         or instr(UCASE(strInjection),"<STYLE")>0         or instr(UCASE(strInjection),"</STYLE")>0         or instr(UCASE(strInjection),"COOKIE")>0        or instr(UCASE(strInjection),"<DOCUMENT.")>0          or instr(UCASE(strInjection),"SCRIPT:")>0 or instr(UCASE(strInjection),"EMBED")>0 or instr(UCASE(strInjection),"<")>0 or instr(UCASE(strInjection),">")>0   or instr(UCASE(strInjection),"HTTP:")>0 or instr(UCASE(AsciiToUnicode(strInjection)), AsciiToUnicode("<"))>0 or instr(UCASE(AsciiToUnicode(strInjection)),AsciiToUnicode(">"))>0 or instr(UCASE(strInjection), "&#")>0        Then
%>
<script>
        alert("½ºÅ©¸³Æ®³ª HTMLű״ »ç¿ëÇÏ½Ç ¼ö ¾ø½À´Ï´Ù.");
        history.back();
</script>
<%

response.end
end if

%>
<%
        'Ư¼ö¹®ÀÚ º¯°æÇϱâ
        Function Checkot(CheckValue)
                CheckValue = replace(CheckValue, "<", "<")
                CheckValue = replace(CheckValue, ">", ">")        
                CheckValue = replace(CheckValue, "&", "&" )
                Checkot = CheckValue
        End Function

        Function Checkit(CheckValue)
                CheckValue = replace(CheckValue, "&" , "&")
                CheckValue = replace(CheckValue, "<", "<")
                CheckValue = replace(CheckValue, ">", ">")
                CheckValue = replace(CheckValue, "'", "''")
                Checkit = CheckValue
        End Function

        Function numdel(var)
                If InStr(var,".") Then
                        a = Split(var,".")(0)
                        If Len(Left(Split(var,".")(1),2)) > 1 Then
                                b = Left(Split(var,".")(1),2)
                        ElseIf Len(Left(Split(var,".")(1),2)) > 0 Then
                                b = Left(Split(var,".")(1),2) & "0"
                        Else
                                b = "00"
                        End If
                        var = a & "." & b
                Else
                        var = var & ".00"
                End If

                numdel = var
        End Function
%>

Å×½ºÆ® »çÀÌÆ® °¢ Æû¿¡¼­ ºÒ·¯¿À´Â sql injection ¹æ¾î ÀÔ´Ï´Ù.
ºÎÁ·ÇÑ°Ô ÀÖÀ»±î¿ä ?

  Hit : 2801     Date : 2019/10/04 07:19



    
ss4747 ¾È³çÇϼ¼¿ä!!

¸ðÀÇÇØÅ· °¡´ÉÀÚ ¸ðÁý ÁßÀÎ Çؿܾ÷üÀÔ´Ï´Ù

¾÷¹«ÀÇ ÁøÇà¹æ½ÄÀº ÇÁ¸®·£¼­ Çü½ÄÀ¸·Î ÀúÈñ°¡ Á¦°øÇص帰

»çÀÌÆ® ¸ðÀÇÇØÅ· ¼º°ø½Ã °Ç´ç À¸·Î Áö±ÞÇص帳´Ï´Ù

ÀÚ¼¼ÇѾȳ»»çÇ×¹× ±âŸ¹®ÀÇ´Â ÅÚ·¡±×·¥ ss4747 ¿©±â·Î ¿¬¶ôÁÖ½Ã¸é »ó¼¼ÇÏ°Ô ¾Ë·Áµå¸®°Ú½À´Ï´Ù
2019/10/08  
cd80 or ´ë½Å || ¸¸ ½áµµ ¿ìȸ µÇ´Â°Å°°Àºµð.. sqli´Â prepared statement·Î ¸·À¸½Ã´Â°Ô ÁÁ½À´Ï´Ù ÀÌ·±½ÄÀÇ ´Ü¼øºí·¢¸®½ºÆ®´Â ¿Ø¸¸ÇÏ¸é ¹«Á¶°Ç ¶Õ¸°´Ù°í »ý°¢ÇϼžßÇØ¿ä 2019/10/11  
74   º¸¾È ±¸ÃàÀ» ¾î¶»°Ô ÇؾßÁö¿ä?[2]     hajunggu
11/13 3356
73   ½ÎÀÌÇØÅ·´çÇÑ°Å ´©°¡ÇÑÁþÀÎÁö ¾Ë¼ö ÀÖ³ª¿ä?[1]     hackerwook
08/11 4256
72   ÄÄÇ»ÅÍ¿¡ ´ëÇØ Ã³À½¹è¿ì´Âµ¥ ÇØÅ·¸ÕÀú ¹è¿öµµ µÇ·ÃÁö?[2]     hacker17
11/17 3462
71   ±Í½Å »çÀÌÆ®[2]     h@cking2013
05/31 15782
70   ÇÑ±Û ÀÎÄÚµù[5]     h@cking2013
06/24 3413
69   phpÃ¥ Ãßõ ºÎŹµå¸³´Ï´Ù.[1]     h@cking2013
06/05 3911
68   ¾È³çÇϼ¼¿ä ÇØÅ·ÀÔ¹® ¿ÏÀüÃʺ¸ ´ëµùÀÔ´Ï´Ù. ±ÞÁú¹®¿©[5]     guswl90
04/15 6344
67   À¥»çÀÌÆ® DBÁ¤º¸¸¦ ¾Ë·Á¸é ¾î¶»°Ô ÇÏ¸é µÉ±î¿ä?[3]     gumi3359
06/06 3417
66   ÇØÅ·¿¡ ±âÃʸ¦ ´ëÇؼ­ ¾Ë¾Æº¸·Á°íÇϴµ¥[2]     ggab_coke
05/01 3528
65   ¾È³çÇϼ¼¿ä. webgoat¿¡ °üÇؼ­ Áú¹® µå¸±·Á±¸¿ä.[2]     GaOnNuRI
07/05 4489
64   xss ¿ìȸÇÒ ¹æ¹ý ¾øÀ»±î¿ä??[3]     ezkiller
10/22 7029
63   get method ¿¡ °üÇÑ Áú¹®[1]     ewqqw
03/13 2745
62   POST METHOD     ewqqw
03/13 2395
61   Post Method[2]     ewqqw
03/16 2529
60   cookie °ü·Ã[1]     ewqqw
03/23 2676
59   SQL injection ±âº»     ewqqw
03/24 3142
58   À¥ sqlmap Áß¿¡[1]     europa8340
07/26 2247
  sql injection ¹æ¾î ÄÚµå[2]     europa8340
10/04 2800
56   ¾ÆÆÄÄ¡ ¼³Á¤Áß ¿À·ù[2]     eunjong147
02/06 8381
55   À¥ÇØÅ· Áú¹®[1]     ericseo16
10/14 2821
[1][2][3][4][5][6][7] 8 [9][10]..[11]

Copyright 1999-2024 Zeroboard / skin by Hackerschool.org / Secure Patch by Hackerschool.org