#SQLi

2025-03-21

Codeby.Games. CTF TASK «СМС»/«SMS»

Приветствую всех любителей CTF и этичного хакинга на стороне Red Team! В этой статье мы рассмотрим прохождение легкого таска «СМС», разработанного пентестерами из команды Codeby.Games. Справка: codeby.games — отечественный условно бесплатный веб‑проект, где каждый может попрактиковаться в оттачивании навыков наступательной кибербезопасности. Таски (задания) представлены в широком спектре: начиная от использования методов OSINT и заканчивая компрометацией учебного домена Active Directory. CTF разделяются на три группы — «Легкий», «Средний», «Сложный» в различных категориях. Но подробнее об этом — на официальном сайте проекта. Итак, приступим. Задание «СМС» находится в категории «Квесты».

habr.com/ru/articles/893092/

#CTF #redteam #task #sqli #hash

2025-03-09

I wrote a quick #blogpost on #ntlm authentication with #sqlmap using #burpsuite proxy.

bbence.me/blog/2025-03-09_ntlm

I did this as a workaround, since the `python-ntlm` package that SQLMap wants still uses Python 2's syntax for some reason and SQLMap does not like that.

#pentesting #sqli #blog #security

DataScienceJobsdatasciencejobs
2025-01-29
DataScienceJobsdatasciencejobs
2025-01-24

🏢 SQLI is hiring a Data Scientist
Location: 🇲🇦 Rabat, Casablanca, Morocco

#

datasciencejobs.com/jobs/data-

2024-12-11

Remote Code Execution через SQL инъекцию в Zabbix (CVE-2024-42327)

27 ноября 2024 года была выявлена критическая уязвимость в Zabbix с CVSS-оценкой 9.9 , представляющая собой SQL-инъекцию в одном из эндпоинтов API Zabbix. Уязвимость позволяет атакующему, имеющему доступ к API, выполнить произвольные SQL-запросы. При определённых настройках Zabbix, которые разрешают удалённое выполнение команд через агентов, эта уязвимость может быть использована для полной компрометации инфраструктуры , находящейся под мониторингом Zabbix.

habr.com/ru/articles/865828/

#RCE #SQLi #zabbix #pentest #cve

2024-11-13

Seria podatności w systemach samochodów Mazda dotycząca Connectivity Master Unit

Czytelnicy z dłuższym stażem zapewne pamiętają podatność w samochodach Nissan i Mazda, która powodowała reboot systemu audio. Mazda ponownie ma problemy związane z błędami w systemie Mazda Connect Connectivity Master Unit (CMU), który wykorzystuje system operacyjny Linux i jest instalowany w wielu modelach samochodów tego producenta. Błędy zostały odkryte przez badaczy...

#WBiegu #Cve #Mazda #Rce #Sqli

sekurak.pl/seria-podatnosci-w-

-11-

SQL Injection Isn't Dead: Smuggling Queries at the Protocol Level - @pspaul

SQL injection attacks exploit vulnerabilities in web applications that fail to properly sanitize user input, allowing attackers to inject malicious SQL code into database queries.

In the past, they were as prevalent as can be when it comes to web app vulnerabilities, but recent advances in web servers' default configurations and protection mechanisms have made them harder to exploit. This is evident by their ranking in the well-known OWASP Top 10 project.

However, in this talk, Paul shows an exciting new avenue for these vulnerabilities — attacking the underlying protocol!

When it comes to databases today like PostgreSQL, MySQL, Redis and MongoDB, servers communicate with them over the wire using a binary protocol. This binary protocol is TLV-based: first, the type of message, then its length, and finally, the value. So your SQL query is actually embedded within such a "packet".

While these binary protocols are commonplace in web servers' communication with peripherals, Paul focused on databases, and specifically how the length field of a message is handled by libraries when it receives a very large message, namely, more than the size that could fit in a 32-bit field.

He discovered that prominent open-source packages handling connecting and querying PostgreSQL and MongoDB, upon receiving a message longer than 232 bytes, calculate the length of the message correctly while truncating it to 32-bit before writing the length field.

This means that a message just over 232 bytes arrives at the database prepended with a length field which is very small, leaving the rest of the message to be accidentally parsed as packets! This gives a theoretical attack full control over queries.

While data exfiltration is almost not possible (the application usually returns the result of the first query), attackers can simply add a new user with high privileges to the database and use it to steal data.

On discovery, Paul wasn't satisfied with the vulnerability's exploitability — a potential attacker wouldn't know exactly the server's query and where the malicious payload is embedded, they have to send multiple 2GB queries, making the exploit very long and noisy. Through some nice tricks, borrowed from the world of shellcodes, he managed to reduce the attack process to at most 2 tries!

This research avenue still has a lot of possibilities open — Paul only scratched the surface. Binary protocols are used extensively for communication with many other applications like logging, storage, queues and caches. Even for databases — just a subset were inspected.

An enlightening talk, showing how produce it can be to take an approach and techniques used in one area of vulnerability research (in this case HTTP desync attacks by James Kettle) and applying it to a completely different domain.

#DEFCON #databases #sqli #vulnerability

youtube.com/watch?v=Tfg1B8u1yv

Claus Cramon Houmannclaushoumann
2024-10-24

And now the last talk before the afternoon break is Paul Gerste of Sonar who will show us that SQL-i isn’t dead in “SQL injection isn’t dead: Smuggling Queries at the Protocol level” at, of course, @hack_lu

Martin Boller 🇬🇱 🇺🇦 :tux: :freebsd: :windows: :mastodon:itisiboller@infosec.exchange
2024-10-24

Happening 15:30: "SQL Injection Isn't Dead: Smuggling Queries at the Protocol Level"

@hack_lu #hacklu2024 #SQLi

2024-10-21

SQL Injection Cheat Sheet 💉

🔖#infosec #cybersecurity #hacking #pentesting #security #sqli

Labdoo.org (Germany)Labdoo_D
2024-10-11

Die SQLI Deutschland GmbH aus Dortmund spendete rund 40 Laptops, die das Unternehmen nicht mehr verwendet.
Das Foto zeigt v.l.n.r. Lynn Haustov, Annika Ekici, Armin Cibulski (Labdoo Hub Iserlohn), Christian Schacht (GF) und Patrick Heinrich (IT), alle von SQLI.
Vielen Dank für eure IT-Spende platform.labdoo.org/de/content (weitere Laptops folgen noch).

Im Büro der Fa. SQLI stehen 5 Personen, im Hintergrund je ein Rollup von dem Unternehmen und Labdoo. Dahinter eine Fensterfront. Alle Personen schauen in die Kamera. Auf dem Boden steht ein Karton mit Zubehör und Stapel von Laptops.
Sam Stepanyan :verified: 🐘securestep9@infosec.exchange
2024-09-15

#WordPress: CVE-2024-8522 & CVE-2024-8529 (CVSS 10): #LearnPress plugin SQL Injection (#SQLi) #Vulnerability Leaves 90K+ WordPress Sites at Risk:
👇
securityonline.info/cve-2024-8

kriware :verified:kriware@infosec.exchange
2024-09-09

Bypassing Airport Security via SQL Injection

The article reveals a SQL injection vulnerability in FlyCASS, used for airport security checks. By exploiting it, attackers could bypass TSA screenings and gain unauthorized access to restricted areas.

ian.sh/tsa

#sqli

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst