From: infolookup@gmail.com
Date: Mon Oct 29 2007 - 19:56:21 EST
I tried doing a few commands after I telneted to it but it required more rights. I the only venue of sucess I got so far was loging in to the admin management page of the site, which is where I was trying to see if I could get further.
Sent via BlackBerry from T-Mobile
-----Original Message-----
From: cwright@bdosyd.com.au
Date: 29 Oct 2007 21:38:47
To:pen-test@securityfocus.com
Subject: Re: Pentesting Webserver
Have you tested to see if the FTP server is allowing uploads? Is the upload directory shared if one exists? I would not bypass FTP so soon.
Don’t forget the 2001 Apache compromise…
See Hal Pomeranz’s PPT at http://www.baylisa.org/library/slides/2002/baylisa-oct02.pdf
Regards,
Craig Wright
---In Reply to---
Hello all,
I am in the middle of a test, so far I found out ftp, amount other things allows anonymous login, but my main concern is looking for sql injection points.
I used Paros and found a point, I can enter something like anything' x' or x=x' for both the username and email filed on the form and that would allow me to login as username admin, now I would like to know how can I use this to get a full list of accounts and what not to include in my report.
I tried doing some queries of this nature from the web browser but I am not even getting an error message, ex http://test.com?email=code&password=code
Sql is a new area for me so any and all help is needed
------------------------------------------------------------------------
This list is sponsored by: Cenzic
Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!
http://www.cenzic.com/downloads
------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:58:11 EDT