Penetration Test - PHP / APACHE

From: larry@appsecurity.com
Date: Thu Mar 23 2006 - 07:45:54 EST


('binary' encoding is not supported, stored as-is) Ok,

Im doing a pen-test for a client-

I have found the application to be running on
Apache 1.3 with a SQL Backend-

I was able to download the .inc file with the admin username and password..

The only problem is that the database is conifgured with "localhost" so I cant connect with a database client remotely- ( Expected this in a DMZ )

What are attack vectors are possible once obtaining the SQL user and pass?

I thinking that this is a SQL only system so the credentials wouldnt work on any other services ( FTP , etc )

Any ideas Appreciated,

Larry

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
As attacks through web applications continue to rise, you need to proactively
protect your applications from hackers. Cenzic has the most comprehensive
solutions to meet your application security penetration testing and
vulnerability management needs. You have an option to go with a managed
service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm).
Download FREE whitepaper on how a managed service can help you:
http://www.cenzic.com/forms/ec.php?pubid=10025
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com
------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:43 EDT