MySQL is an open-source relational database management system.
-2
votes
0answers
23 views
how do i make an input field that is stored in html5 (do i haft to use php or MySQL?(PHP is perferred)) [on hold]
So im trying to make a tag that stores data somewhere on a compuer in a FX .txt file?
does anyone know how to do that any help would be aprreiatted(I have googled but couldn't find any PS sorry for ...
2
votes
1answer
99 views
is 'mysql_real_escape_string' enough
Recently on stackoverflow I've seen many discussions that mysql_*_escape_string is deprecated and instead recommending PDO.
The way I've been doing it was to allow only letters and ' in the name field ...
1
vote
1answer
51 views
What permissions should I give to a MySQL 'user' that searches my databse?
My site has a search form, which queries a few tables for whatever my end users want to find.
What permissions should I give my MySQL user in order to search the database and update the 'times ...
1
vote
2answers
70 views
How a database connection makes mysqli_real_escape_string more secure?
I am learning PHP+MySQL and observed that mysqli_real_escape_string function in PHP requires a identifier to a MySQL connection. From some research I found that it has something to do with charset and ...
4
votes
1answer
116 views
What are the dangers with creating MySQL databases on the fly?
I am building a site where people set up small, private, social networks. For ease of administration and portability, I would like each network to be stored in a different MySQL database.
I ...
0
votes
2answers
48 views
Security on Ubuntu 12.04 LST Server for Business App
I am developing bussines application based on php and mysql on ubuntu 12.04 lts server.
I have closed all ports except :80 and php code can be executed only by security login and not using cookies but ...
2
votes
2answers
203 views
Is “Why Should You Avoid AES In MySQL?” true?
From a 2012 Smashing Magazine article quite a bold statement is made to avoid AES in MySQL itself. Or as they put it "Why Should You Avoid AES In MySQL?". However, if you search for SQL encryption, ...
3
votes
1answer
104 views
Why does MySQLi using question marks (?) instead of the sprintf formatting?
As the title states, why does MySQLi use question marks instead of sprintf() formatting? For example, why is it
$stmt = $mysqli->prepare("SELECT * FROM table WHERE column1 = ?");
...
1
vote
1answer
82 views
What types of hacking attacks happen alongside a DOS or DDOS attack? [closed]
I'm trying to find some good material on this topic for a paper I'm trying to write for class. Any and all help is very much appreciated.
2
votes
2answers
282 views
Is $_REQUEST['id'] vulnerable to sql injection
I have the code below in my newsview.php.I want to know why the code below vulnerable to sql injection.I already test the sql injection in the code below.
$id = intval($_REQUEST['id']);
$result = ...
1
vote
1answer
994 views
Uploading Shell Using SQLI
I found an SQL injection vulnerability in a Wordpress installation inside one of my lab machines and I am trying to leverage it to upload a shell.
I can get the admin hash but it seems that it is ...
-2
votes
2answers
484 views
Is this site vulnerable to sql injection? [closed]
I have my site build from a company. I read about website vulnerabilities on the internet and i did some test on my site. It throws these errors.
QueryString key:TutorialId was expected to be of ...
6
votes
2answers
221 views
SQL injection across multiple tables
If a website has multiple web apps, each of them connected to different tables in a database and all of the apps are protected from SQL Injection except one; can that one web app be used to ...
3
votes
3answers
243 views
Tokenless REST API security concerns
I'm designing an API in PHP/MySQL that, by its design, will not store a user's password in the database and thus does not generate authorization tokens for the client to hold. The reason for this is ...
7
votes
1answer
127 views
Ensure data doesn't linger after being deleted
I'm trying to make a service that keeps as little data on its users as possible. To that end, I want to make sure that someone using forensic tools won't gain any more information than I would by ...
4
votes
4answers
303 views
How to get the output of a SQL injection?
This is just for learning purpose. I want to get all the usernames and passwords from a table in a MySQL server, where "magic quotes" have been disable.
In the input for the username: I put something ...
1
vote
0answers
161 views
how to prevent ASCII Encoded / Binary String SQL injection in Codeigniter
I am using CodeIgniter for two years and I am digging into penetration testing nowadays. I think that ActiveRecord does good job for preventing sql injections, but i have following questions:
I want ...
3
votes
1answer
184 views
Why does MYSQL's LOAD FILE only read some files and not others?
As part of an assessment I'm using mysql to poke around at a compromised hosts' filesystem. As I seemed to remember from the last time I played with it, some files can be read (eg. /etc/passwd) and ...
10
votes
3answers
1k views
Is it possible to do SQL injection (HIGH Level) on Damn Vulnerable Web App?
I searched all over google to see how it would be possible to bypass the following (it's from the high level of security from DVWA):
<?php
if (isset($_GET['Submit'])) {
// Retrieve data
$id ...
1
vote
1answer
144 views
MySQL AES Encryption - Is it good idea to store 3rd Party Auth Tokens using AES Encryption?
I need some advice on MySQL AES Encryption. I'm developing an application which connects to various 3rd-Party APIs and retrieves the Access Tokens for the application users. These Access Tokens are ...
0
votes
0answers
436 views
Issues setting up DVWA for SQLMAP
I am starting on sqlmap, and have dvwa for practicing web app penetration.
I am having the error "Could not connect to the database - please check the config file."
Not sure what the problem is but ...
0
votes
1answer
161 views
What are the reasons this SQL injection code wouldn't work? [duplicate]
In Software Assurance class I was asked a question why following query allows SQL injection which will allow log in into unsafe phpBB version but will not allow any modification of the database.
We ...
1
vote
1answer
157 views
Securing Publicly Exposed MySQL Database for Group CS Project
Hello I am looking for some advice. For an Advanced C++ Programming Course I am taking another student and doing a project. For this project we plan on using a MySQL Database as our backend database.I ...
2
votes
4answers
660 views
SQL Injection with pass MD5
I want to know, if in my login form there is any SQL injection possible. If there is, what could the exploit's web form entry look like?
I send username and password by html form (POST).
The login ...
1
vote
3answers
250 views
Vulnerability scanner shows SQL errors were disclosed.How Severe it is?
When I scanned my site for Vulnerabilities I found this error.
Various SQL errors were disclosed within the application source code or other files.
I have checked for sql injection and confirmed ...
3
votes
1answer
91 views
How to secure MySQL data from changes?
I'm looking for a way to secure MySQL data in particular tables for example settings table.
Ideal solution would hook up to database and log all INSERT, UPDATE and DELETE requests to particular ...
2
votes
3answers
117 views
A scammer placed a remote file on a Wordpress website?
A previous developer I have used has got upset and start compromising the files of my website on daily bases (such as changing the index of the site with weird messages, deleting the .htaccess, ...
0
votes
2answers
82 views
General User Authorization Security
I am creating a website that needs user authorization. It is my first time creating a website to go live, and also my first time trying to do any form of authorization. The following is my plan, will ...
0
votes
3answers
530 views
Security checklist for hosting a website on dedicated server - Linux [closed]
I have been searching for a while now. But i can't find a start-up and advanced sought-of checklist to understand the most important things to consider while going for dedicated hosting server for a ...
3
votes
4answers
753 views
PHPMyAdmin vs Remote client restricted by IP address
I'm looking for a secure way to access a MySQL database. I'm currently using PHPMyAdmin but wondering if it would be better to use a desktop client and restrict access to only the IP addresses I know ...
4
votes
5answers
2k views
Are there any tools for scanning for SQL injection vulnerabilities while logged in?
Some pages of my website were vulnerable to SQL injection. The injection worked only when the user was logged in. I have now fixed this problem, and now I want to make sure that no similar problems ...
12
votes
3answers
3k views
SQL injection can bypass login but not drop table
I've setup a test environment for running some SQL Injection against my code and learning how to defend against it. I can bypass the login form using the following in the password field:
' OR ...
4
votes
1answer
127 views
SQL injection not returning expected results
I've created a test site in order to learn about SQLi and then protect against it. I may be misunderstanding how it is supposed to behave but at present I'm not getting the results I expect.
The ...
1
vote
2answers
77 views
Mysql database password and webform password
I have a Mysql database where one table is meant to store user complaints/comments/suggestions. I am using Mysqli to connect to the database with a
...
2
votes
2answers
277 views
Suspicious entries in MySQL database from user input forms - sql injection?
I built a website from scratch using PHP and MySQL for my residential community and our budget is a big fat '0'.
Five days ago I discovered that there were 222 entries in a table in my database that ...
3
votes
3answers
522 views
SQL injection using letters and numbers?
I was wondering if it is at all possible for a hacker to perform an SQL injection attack using just letters and numbers. For example, let's take a look at this PHP code which uses regular expressions ...
1
vote
2answers
214 views
How to deal with MySQL's Errcode 13 when trying to write a shell
My attack machine is running Kali and the server is running CentOS 6.4 with DVWA.
I'm trying to write a shell through an SQL injection. The payload is
' UNION SELECT '', '<?PHP ...
-2
votes
1answer
85 views
Using Old version of mysql connector's security issue [closed]
I'm using asp.net 4.0 and MySQL. Last week my hosting firm changed security level of from full to medium. MySQL connector doesn't work correctly anymore. For this reason I'm using old version of ...
6
votes
2answers
449 views
Backdoors after SQL injection?
I just found an injection vulnerability on a live site of a client. It looks like this:
$sql = "SELECT * FROM users_dl WHERE Username = '" . $Uname . "' AND Password = '" . $Pword . "'";
I ...
2
votes
0answers
254 views
Where to store sensitive client details (MYSQL DB credentials) [duplicate]
I have a security related question about storing some client information - specifically their database login credentials.
My app works based on the client and so the database details need to be set ...
0
votes
2answers
202 views
How to implement shamir's secret sharing algorithm using AES_ENCYRPT
I am using MySQL AES_ENCRYTP() and AES_DECRYPT() to store sensitive details in a database, and currently storing the key in a php file outside of the web root with read access only. The key file looks ...
-1
votes
3answers
569 views
Connect to Mysql database from remote host without remote access [closed]
I have a website which is managed through CPanel. I know that remote database connections are disabled by default and I have tested that it is indeed disabled.
I know that many people have some of my ...
4
votes
1answer
128 views
Is it possible for users to insert forbidden characters into sites with htmlentities or mysqlescapestring?
So, in my brief research in PHP security, I have been guided toward two important functions to remove forbidden characters from forms. One being "htmlentities" and the other being ...
5
votes
4answers
2k views
A customers site had a big mysql injection attack on it, just want to learn from it
I created an online store for a friend of mine.
I created a system that shoots me an email any time there is a database error, that way if it is a bug in my code I can identify it and fix it. The ...
7
votes
3answers
7k views
Is there any SQL injection for this PHP login example?
I want to write a login form, and I got one example from the web.
I want to know, if there is any SQL injection for this code? If there is, what could the exploit's web form entry look like?
This is ...
7
votes
2answers
3k views
SQL Injection: Drop All Tables
I used some vulnerability scanners to check a site of mine, and an instance of blind SQL injection was returned. However, when I try to exploit this vulnerability by entering the following into the ...
1
vote
1answer
198 views
XSS MySQL Database Accessible?
I'd like to know if there is any danger of someone being able to access the database via XSS vulnerabilities on this page.
I have the following link. When you go to this link, the text I've enclosed ...
2
votes
3answers
278 views
MySQL database access prevention
I am doing a PHP website for a client who deals with third party financial information, and he is concerned about the developmers (me) having access to all the information, which is obviously a valid ...
0
votes
1answer
262 views
Is it secure to use a custom written Php extension for handling + hashing (db) keys?
I'm designing the security of a new application and try to figure out what the best way is to store the keys of the mysql AES encryption in the file system. I've seen several options like store it ...
2
votes
2answers
252 views
MySQL Access Control?
I have read somewhere that it is better to have two different MySQL logins in order to prevent hacking. What I mean is having one MySQL login for read access (SELECT permission) and another login for ...