|
![](/images/resource/spacer.gif) |
|
โดน blind sql injection ช่วยด้วยครับ |
|
![](/images/resource/viewboard_01.gif?v=1001) |
|
|
![](/images/resource/viewboard_03.gif?v=1001) |
![](/images/resource/viewboard_04.gif?v=1001) |
|
โดน blind sql injection มา Hack pass word รบกวนดูให้หน่อยครับ ขอบคุณครับ
<?php session_start(); ?>
<?php
require_once("../include/config.php");
require_once("../include/module_database.php");
require_once("../include/module_functions.php");
$connection = db_open_connection();
mysql_select_db(DATABASE_NAME,$connection);
$username = $_POST['username'];
$password = $_POST['password'];
$TableName = "user";
$Condition = "username = '" . trim($username) . "'";
$Condition .= " AND password = '" . md5(trim($password)) . "'";
$Login_NumRow = NumRow($TableName,$Condition,$connection);
if ($Login_NumRow == 1)
{
$user_array = Select($TableName,$Fields="*",$Condition,$connection);
$id = $user_array['id'];
$_SESSION['admin_login'] = 1;
$_SESSION['admin_id'] = $id;
$_SESSION['admin_start'] = time();
$SetFieldsValues = "lastlogin='".date('Y-m-d H:i:s')."'";
Update($TableName,$SetFieldsValues,$Condition,$connection);
reDirectURL ("admin_manage.php");
}
else
{
reDirectURL ("index.php");
}
db_close_connection($connection);
?>
<html>
</html>
Tag : PHP, MySQL
![](/images/adv.jpg?v=1001)
|
|
![](/images/resource/blockviewtopic_01.gif?v=1001) |
![](/images/resource/blockviewtopic_02.gif?v=1001) |
![](/images/resource/blockviewtopic_03.gif?v=1001) |
![](/images/resource/blockviewtopic_04.gif?v=1001) |
Date :
2016-08-10 09:32:20 |
By :
pissanu8970 |
View :
1171 |
Reply :
3 |
|
![](/images/resource/blockviewtopic_06.gif?v=1001) |
![](/images/resource/blockviewtopic_07.gif?v=1001) |
![](/images/resource/blockviewtopic_08.gif?v=1001) |
![](/images/resource/blockviewtopic_09.gif?v=1001) |
|
|
|
![](/images/resource/viewboard_06.gif?v=1001) |
![](/images/resource/viewboard_07.gif?v=1001) |
|
![](/images/resource/viewboard_08.jpg?v=1001) |
![](/images/resource/viewboard_09.gif?v=1001) |
![](/images/resource/viewboard_01.gif?v=1001) |
|
|
![](/images/resource/viewboard_03.gif?v=1001) |
![](/images/resource/viewboard_04.gif?v=1001) |
|
ผมก็ไม่รู้นะครับว่าวิธีการ blind sql injection มันทำอะไรยังไง
แต่ผมมีจุดสังเกตุที่บรรทัดนี้
$Condition = "username = '" . trim($username) . "'";
ตัวแปร $username ควรมีการตรวจสอบว่าส่งค่าอะไรเข้ามา เช่น ไม่อนุญาตให้ใส่ = / * # $ % มันน่าจะปลอดภัยขึ้น
|
![](/images/resource/blockviewtopic_01.gif?v=1001) |
![](/images/resource/blockviewtopic_02.gif?v=1001) |
![](/images/resource/blockviewtopic_03.gif?v=1001) |
![](/images/resource/blockviewtopic_04.gif?v=1001) |
Date :
2016-08-10 10:08:53 |
By :
peakna |
|
![](/images/resource/blockviewtopic_06.gif?v=1001) |
![](/images/resource/blockviewtopic_07.gif?v=1001) |
![](/images/resource/blockviewtopic_08.gif?v=1001) |
![](/images/resource/blockviewtopic_09.gif?v=1001) |
|
|
![](/images/resource/viewboard_06.gif?v=1001) |
![](/images/resource/viewboard_07.gif?v=1001) |
|
![](/images/resource/viewboard_08.jpg?v=1001) |
![](/images/resource/viewboard_09.gif?v=1001) |
![](/images/resource/viewboard_01.gif?v=1001) |
|
|
![](/images/resource/viewboard_03.gif?v=1001) |
![](/images/resource/viewboard_04.gif?v=1001) |
|
แล้วถ้างั้นต้องใส่ยังไงครับ
|
![](/images/resource/blockviewtopic_01.gif?v=1001) |
![](/images/resource/blockviewtopic_02.gif?v=1001) |
![](/images/resource/blockviewtopic_03.gif?v=1001) |
![](/images/resource/blockviewtopic_04.gif?v=1001) |
Date :
2016-08-10 10:13:59 |
By :
pissanu8970 |
|
![](/images/resource/blockviewtopic_06.gif?v=1001) |
![](/images/resource/blockviewtopic_07.gif?v=1001) |
![](/images/resource/blockviewtopic_08.gif?v=1001) |
![](/images/resource/blockviewtopic_09.gif?v=1001) |
|
|
![](/images/resource/viewboard_06.gif?v=1001) |
![](/images/resource/viewboard_07.gif?v=1001) |
|
![](/images/resource/viewboard_08.jpg?v=1001) |
![](/images/resource/viewboard_09.gif?v=1001) |
|
|
|
![](/images/digitalocean-banner.jpg)
|
Load balance : Server 05
|