| 
<!doctype html public "-//W3C//DTD HTML 4.0 //EN">
<html>
 <head>
 <title>Sql_inject_attempts: examples</title>
 </head>
 <body>
 <?php
 
 /*
 theses examples try to get some différents informations of the tables
 to test them, remove the comments from a kind of test
 */
 
 require_once "class_sql_inject.php";
 $sql = new sql_inject('./sqlinject.log');
 $_POST['login'] = 'hacker';
 $_POST['test1'] = " admin'#;"; // try to pass through the admin verification
 /*
 $_POST['test2'] = "'%%';DROP TABLE ('users');#"; // try to execute more SQL data
 $_POST['test3'] = "'%%';DROP TABLE ('users');"; // try to execute more SQL data
 $_POST['test4'] = "%%' AND login IS NOT NULL";
 $_POST['test5'] = "%% AND 1 = 1"; // always true expression, will return the 1st tuple - in more case the admin tuple -
 $_POST['test6'] = "%% AND 2 between 1 AND 3"; // always true expression, will return the 1st tuple - in more case the admin tuple -
 $_POST['test7'] = "pass','Y')#";// try to modify it's right
 $_POST['test8'] = "pass','Y');DELETE FROM users WHERE user.is_admin = 'Y' AND login <> 'hacker'#";// try to modify it's right
 */
 
 $sRQ = requete(1);
 echo 'result case [1] found attempt? ['.$sql->test($sRQ)."]<BR>\r\n";
 /*
 $sRQ = requete(2);
 echo 'result case [2] found attempt? ['.$sql->test($sRQ)."]<BR>\r\n";
 $sRQ = requete(3);
 echo 'result case [3] found attempt? ['.$sql->test($sRQ)."]<BR>\r\n";
 $sRQ = requete(4);
 echo 'result case [4] found attempt? ['.$sql->test($sRQ)."]<BR>\r\n";
 $sRQ = requete(5);
 echo 'result case [5] found attempt? ['.$sql->test($sRQ)."]<BR>\r\n";
 $sRQ = requete(6);
 echo 'result case [6] found attempt? ['.$sql->test($sRQ)."]<BR>\r\n";
 $sRQ = requete(7);
 echo 'result case [7] found attempt? ['.$sql->test($sRQ)."]<BR>\r\n";
 $sRQ = requete(8);
 echo 'result case [8] found attempt? ['.$sql->test($sRQ)."]<BR>\r\n";
 */
 function requete($case)
 {
 $sRQ = '';
 switch ($case)
 {
 // try to verify a identity
 case 1:
 {
 $sRQ = "SELECT * FROM users WHERE login = '".$_POST['test'."$case"]."' AND pwd = PASSWORD('".$_POST['mdp']."')";
 break;
 }
 // try to verify a identity
 case 2:
 {
 $sRQ = "SELECT * FROM users WHERE login = '".$_POST['test'."$case"]."' AND pwd = PASSWORD('".$_POST['mdp']."')";
 break;
 }
 case 3:
 {
 $sRQ = "SELECT email FROM users WHERE login = '".$_POST['test'."$case"]."'";
 break;
 }
 case 4:
 {
 $sRQ = "SELECT email FROM users WHERE login = '".$_POST['test'."$case"]."'";
 break;
 }
 case 5:
 {
 $sRQ = "SELECT email FROM users WHERE login_id = ".$_POST['test'."$case"];
 break;
 }
 case 6:
 {
 $sRQ = "SELECT email FROM users WHERE login_id = ".$_POST['test'."$case"];
 break;
 }
 case 7:
 {
 $sRQ = "INSERT INTO users ('login','pwd','is_admin') VALUES ('".$_POST['login']."','".$_POST['test'."$case"]."','N')";
 break;
 }
 case 8:
 {
 $sRQ = "INSERT INTO users ('login','pwd','is_admin') VALUES ('".$_POST['login']."','".$_POST['test'."$case"]."','N')";
 break;
 }
 }
 echo "case [".$case."] : SQL data with SQL inject [".$sRQ."]<BR>\r\n";
 return $sRQ;
 }
 ?>
 </body>
 </html>
 
 |