SQL Hack

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

    SQL Hack

    My site hacked,
    In my SQL ibwf_users all password are the same.
    Hacker can use any members username in my site.
    How does it happen?
    And
    How to prevent this kind of hacking?
    LESS TALK. LESS MISTAKE.

    HTTP://APPSROB.COM - LIST OF MY FACEBOOK APPS!

    #2
    Open my username (subzero) search anti sql injection then do what it says

    Enjoy!
    Visit: Chat4u.mobi - The New Lay Of being a site of your dreams!
    Visit: WapMasterz Coming Back Soon!
    _______
    SCRIPTS FOR SALE BY SUBZERO
    Chat4u Script : coding-talk.com/f28/chat4u-mobi-script-only-150-a-17677/ - > Best Script for your site no other can be hacked by sql or uploaders.
    FileShare Script : coding-talk.com/f28/file-wap-share-6596/ -> Uploader you will never regret buying yeah it mite be old now but it still seems to own others...
    _______
    Info & Tips
    php.net
    w3schools.com

    Comment


      #3
      Okay thanks dude, well, How did the hackers that?
      what kind of sql injection he used?
      LESS TALK. LESS MISTAKE.

      HTTP://APPSROB.COM - LIST OF MY FACEBOOK APPS!

      Comment


        #4
        More like xml injection but my little code will block them doing it to you..
        Visit: Chat4u.mobi - The New Lay Of being a site of your dreams!
        Visit: WapMasterz Coming Back Soon!
        _______
        SCRIPTS FOR SALE BY SUBZERO
        Chat4u Script : coding-talk.com/f28/chat4u-mobi-script-only-150-a-17677/ - > Best Script for your site no other can be hacked by sql or uploaders.
        FileShare Script : coding-talk.com/f28/file-wap-share-6596/ -> Uploader you will never regret buying yeah it mite be old now but it still seems to own others...
        _______
        Info & Tips
        php.net
        w3schools.com

        Comment


          #5
          Where he input that injection?
          LESS TALK. LESS MISTAKE.

          HTTP://APPSROB.COM - LIST OF MY FACEBOOK APPS!

          Comment


            #6
            this looks to be huwards doing again. he tries geting in via your puting some code in the user agent which if u havnt got htmlchars or mysql_real_escape will execute anything in the database you ask it to.
            Want something coded email me at sales@webnwaphost.com for a prices.




            Comment


              #7
              simply.. Just rename all your table name.. for ex.
              from ibwf_users
              to 7awt534_user
              lol..
              open a text editor.. and replace IBWF to (desire name of table) make sure that all of the php file changed!

              Comment


                #8
                Damn! in my SQL ibwf_users.. Registered username a lot of fake1, fake02, fake03............fake10000000 users!
                LESS TALK. LESS MISTAKE.

                HTTP://APPSROB.COM - LIST OF MY FACEBOOK APPS!

                Comment


                  #9
                  pmpl, This is why i banned the noob ...

                  Also Note your using lavalair and yes its full of bugs you can't fix it pay a pro coder for a script that works ok
                  Visit: Chat4u.mobi - The New Lay Of being a site of your dreams!
                  Visit: WapMasterz Coming Back Soon!
                  _______
                  SCRIPTS FOR SALE BY SUBZERO
                  Chat4u Script : coding-talk.com/f28/chat4u-mobi-script-only-150-a-17677/ - > Best Script for your site no other can be hacked by sql or uploaders.
                  FileShare Script : coding-talk.com/f28/file-wap-share-6596/ -> Uploader you will never regret buying yeah it mite be old now but it still seems to own others...
                  _______
                  Info & Tips
                  php.net
                  w3schools.com

                  Comment


                    #10
                    Originally posted by leadiztah View Post
                    simply.. Just rename all your table name.. for ex.
                    from ibwf_users
                    to 7awt534_user
                    lol..
                    open a text editor.. and replace IBWF to (desire name of table) make sure that all of the php file changed!
                    This is pointless if your not correctly protected as sql can be crashed easily to give out your new table names

                    Comment


                      #11
                      i have 4 times change the table name but it same happened like robzsky.. I also have put many anti sql in my script..why it still g0t hacked by injecti0n?
                      our lfe is simple words....
                      http://mygenkz.net
                      ewanz06@yahoo.com
                      PHP Code:
                      $output="i am NOoob....";
                      $newfile="ewanz.txt";
                      $file fopen ($newfile"w");
                      fwrite($file$output);
                      fclose ($file); 

                      Comment


                        #12
                        Originally posted by ewanz View Post
                        i have 4 times change the table name but it same happened like robzsky.. I also have put many anti sql in my script..why it still g0t hacked by injecti0n?
                        Originally posted by something else View Post
                        This is pointless if your not correctly protected as sql can be crashed easily to give out your new table names
                        You still have holes in your site use the below code and it will fix them:

                        This will stop the 2 main holes you are not protecting:
                        Add this to your config.php
                        PHP Code:
                        if(isset($_GET)){foreach($_GET as $key=>$value){$_GET[$key]=addslashes(htmlspecialchars($value));}}
                        if(isset(
                        $_POST)){foreach($_POST as $key=>$value){$_POST[$key]=addslashes(htmlspecialchars($value));}}   
                        if(isset(
                        $_SERVER)){foreach($_SERVER as $key=>$value){$_SERVER[$key]=addslashes(htmlspecialchars($value));}} 
                        if(isset(
                        $_SESSION)){foreach($_SESSION as $key=>$value){$_SESSION[$key]=addslashes(htmlspecialchars($value));}} 

                        Comment


                          #13
                          Dats nt actually guna do anyfin.

                          Comment


                            #14
                            You say that about all my coding :P and also then never say why it wont work ..... SO heres a test...

                            4 of the above tests:
                            before code:
                            test1: ', id='<script>
                            test2: ', id='<script>
                            test3: ', id='<script>
                            test4: ', id='<script>

                            after code:
                            test1: \', id=\'&lt;script&gt;
                            test2: \', id=\'&lt;script&gt;
                            test3: \', id=\'&lt;script&gt;
                            test4: \', id=\'&lt;script&gt;

                            Now can you tell me why its not going to work? ... you probably wont answer me as per usual lol
                            Last edited by something else; 21.08.10, 14:14.

                            Comment


                              #15
                              m8

                              M8 Its me yggrassil hehe. Heres the tip, u must secured ur browser =)


                              http://www.toinx.org

                              Comment

                              Working...
                              X