Daniele,

On Mon, Nov 17, 2008 at 7:42 AM, Daniele Bellucci
<[EMAIL PROTECTED]> wrote:
>>> !! So..., adding a comment isn't always the best. Could you please think
>>> !! about an example where 1 AND 1=1 wouldn't work, and 1 AND 1=1-- would?
>
> I think you're right Andres ... i tried to figure out an example but
> still haven't found.

great, I thought I was the only dumb ;)

> By the way i could ask you :
>
> "Could you please think an example where 1 AND 1=1 work and 1 AND
> 1=1-- wouldn't ?"

I can't, and that's the point.

> But we can avoid these questions ulntil 'fuzz vecotors'  are stored
> inside plugins.
> For now, since you only need to check if a webappz is
> blindSQLInjection vulnerable
> query strings like: ?id=1+0 is enough on numerical values (as well as:
> ?id=CONCAT('str','ing') on strings)

You are fuc**** right! I never thought about that... hmmm. So what I
could do is just:

Original: ?id=1
Fuzzed: ?id=1-1+1

And if the responses to original and fuzzed are the same... then it's
injectable... I like it! But I don't know why, but I trust the "1 AND
1=1" approach more; maybe it's because of your technique new to me...
Is SQLMap using "?id=1+0" to detect blind sql injections?

Cheers,
-- 
Andres Riancho
http://w3af.sourceforge.net/
Web Application Attack and Audit Framework

-------------------------------------------------------------------------
This SF.Net email is sponsored by the Moblin Your Move Developer's challenge
Build the coolest Linux based applications with Moblin SDK & win great prizes
Grand prize is a trip for two to an Open Source event anywhere in the world
http://moblin-contest.org/redirect.php?banner_id=100&url=/
_______________________________________________
W3af-develop mailing list
W3af-develop@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/w3af-develop

Reply via email to