(los[Lord of SQLinjection]) GREMLIN

2020. 4. 23. 00:00Lord of SQLinjection

 

query : select id from prob_gremlin where id='' and pw=''
<?php
  
include "./config.php";
  
login_chk();
  
dbconnect();
  if(
preg_match('/prob|_|\.|\(\)/i'$_GET[id])) exit("No Hack ~_~"); // do not try to attack another table, database!
  
if(preg_match('/prob|_|\.|\(\)/i'$_GET[pw])) exit("No Hack ~_~");
  
$query "select id from prob_gremlin where id='{$_GET[id]}' and pw='{$_GET[pw]}'";
  echo 
"<hr>query : <strong>{$query}</strong><hr><br>";
  
$result = @mysql_fetch_array(mysql_query($query));
  if(
$result['id']) solve("gremlin");
  
highlight_file(__FILE__);
?>

'Lord of SQLinjection' 카테고리의 다른 글

(los[Lord of SQLinjection]) DARKELF  (0) 2020.04.23
(los[Lord of SQLinjection]) WOLFMAN  (0) 2020.04.23
(los[Lord of SQLinjection]) ORC  (0) 2020.04.23
(los[Lord of SQLinjection]) GOBLIN  (0) 2020.04.23
(los[Lord of SQLinjection]) COBOLT  (0) 2020.04.23