!! I started to code a w3af extension to detect blind sql injections this
!! way, and I realized that CONCAT only works on mysql (doh! , that

are you sure? IIRC MySQL 3.x does not support CONCAT.

!! http://some.tld/?id=1+1-1

And here we ask how + was encoded and what the application assumed it
to be.
Strictly looking at RFC it would become a space, but applications
decode the + here to itself too, sometimes .. 
Just keep in mind, and probably test both variants.

!! BUT the problem is that you don't really know if the second "No
!! results" is because of a successful SQL injection where the concat was
!! evaluated, or just because the data was validated and there is no
!! "CONCAT(\'spam.\',\'eggs\')" in the search table. Are my ideas ok? Did
!! I just found the only case where the technique will fail and I should
!! code it disregarding this false positive generation issue? What do you
!! guys think?

difficult. That's 'cause the Subject: says *Blind SQL Injection* :)
You have to find a value first which returns a result, then you can use
concat() to test the injection. It's the other way around as you
described it, somehow:

  Search: something  --> got a result
  Search: concat('some','thing')  --> same result


-------------------------------------------------------------------------
This SF.Net email is sponsored by the Moblin Your Move Developer's challenge
Build the coolest Linux based applications with Moblin SDK & win great prizes
Grand prize is a trip for two to an Open Source event anywhere in the world
http://moblin-contest.org/redirect.php?banner_id=100&url=/
_______________________________________________
W3af-develop mailing list
W3af-develop@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/w3af-develop

Reply via email to