Page 1 of 1

How many ways...

Posted: Wed May 16, 2012 4:21 pm
by SirDice
Can I ask what his friend is doing?

http://forums.freebsd.org/showthread.php?p=177392

Re: How many ways...

Posted: Wed May 16, 2012 6:10 pm
by Egaladeist
Is this just an attempt to access his ' friends ' account?

Re: How many ways...

Posted: Mon May 21, 2012 11:16 am
by SirDice
I don't know. He keeps bitching and moaning that his "friend" can login on any MySQL database without using a username/password.

I'd like to see that.. As far as I know that are no known vulnerabilities that would give that kind of access.

So I'm thinking his mate is full of it...

Re: How many ways...

Posted: Mon May 21, 2012 12:41 pm
by DaFoxx
there 'used' to be several, old school stuff where the username / password combo 'just' had to be a logical argument

username = 1 + 1 = 2 ------- is a true / valid argument - pass
password = 2 + 2 = 4 -------- is also true / valid, and so you could access D/B

but I can't find details TBH, and I imagine this was the really early days, when security wasn't thought of much, if at all, because everyone back then was so honest :hysterical:

other, stack overflow and the like would need some idea of stack sizes, as you need to fill the stack exactly, by manipulating the data sent as authentication, allowing only your payload to be sent over the top as it were, but that isn't indicated here

Re: How many ways...

Posted: Mon May 21, 2012 1:57 pm
by SirDice
You're thinking of SQL injection, where you'd 'trick' a bad query to always return true.

As in entering " ' or 1=1;" as a username so the SQL becomes:

Code: Select all

select * from user where username = '' or 1=1;
Not a problem with MySQL but with badly written web applications. No, or insufficient, user input checking :evil:

Re: How many ways...

Posted: Mon May 21, 2012 4:47 pm
by Talen
Lazy Web developers should be taken out back and beaten.