28.10.2014 Views

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SQL Injection Attacks and Defense - 2009

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

284 Chapter 6 • Exploiting the Operating System<br />

Figure 6.9 An MD5 Hash of net.exe<br />

Using a squeeza.config file that is aimed at our target application, let’s fetch two files:<br />

the remote server’s boot.ini <strong>and</strong> the binary c:\winnt\system32\net.exe. Figure 6.10 displays<br />

the rather terse output from Squeeza.<br />

Figure 6.10 Copying a Binary from the Remote Server<br />

If all went well, we should be able to read the contents of the stolen-boot.ini <strong>and</strong><br />

compare the checksum on the stolen-net.exe:<br />

[haroon@hydra squeeza]$ cat stolen-boot.ini<br />

[boot loader]<br />

timeout=30<br />

default=multi(0)disk(0)rdisk(0)partition(1)\WINNT

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!