(los[Lord of SQLinjection]) GREMLIN
2020. 4. 23. 00:00ㆍLord of SQLinjection
query : select id from prob_gremlin where id='' and pw='' <?php include "./config.php"; login_chk(); dbconnect(); if(preg_match('/prob|_|\.|\(\)/i', $_GET[id])) exit("No Hack ~_~"); // do not try to attack another table, database! if(preg_match('/prob|_|\.|\(\)/i', $_GET[pw])) exit("No Hack ~_~"); $query = "select id from prob_gremlin where id='{$_GET[id]}' and pw='{$_GET[pw]}'"; echo "<hr>query : <strong>{$query}</strong><hr><br>"; $result = @mysql_fetch_array(mysql_query($query)); if($result['id']) solve("gremlin"); highlight_file(__FILE__); ?> |
'Lord of SQLinjection' 카테고리의 다른 글
(los[Lord of SQLinjection]) DARKELF (0) | 2020.04.23 |
---|---|
(los[Lord of SQLinjection]) WOLFMAN (0) | 2020.04.23 |
(los[Lord of SQLinjection]) ORC (0) | 2020.04.23 |
(los[Lord of SQLinjection]) GOBLIN (0) | 2020.04.23 |
(los[Lord of SQLinjection]) COBOLT (0) | 2020.04.23 |