According to the stack overflow comments 0x313032 ...etc is the "calling
card" of Havij, an automated injection tool.  The commentor said "somewhat
of a necro" - which I have no idea what that means... he's either
disparaging a race of intergalactic conquerors or misspelling macro.

-----Original Message-----
From: Byron Mann [mailto:byronos...@gmail.com] 
Sent: Monday, July 22, 2013 11:49 AM
To: cf-talk
Subject: RE: Hack Attempt on our database last night


That makes sense to me, looks more like an attempt to see if an injection
would work.

Byron Mann
Lead Engineer & Architect
HostMySite.com
On Jul 22, 2013 12:46 PM, "Mark A Kruger" <mkru...@cfwebtools.com> wrote:

>
> Justin (et al)
>
> When I unpack this I get
>
> 999999.99 /*!3000 union all select   0x313032...   etc     */ --
>
> Doesn't the /* */ force the whole string into a comment? Hard to see how
> that would succeed.
>
> -Mark
>
>
>
> -----Original Message-----
> From: Justin Scott [mailto:leviat...@darktech.org]
> Sent: Monday, July 22, 2013 11:19 AM
> To: cf-talk
> Subject: Re: Hack Attempt on our database last night
>
>
> In this particular case it's not generating SQL but just filling in
> space to match the number of columns with the original query.
> Basically once it executes without an error it allows the attacker to
> see how many columns the original query is selecting.  It's part of an
> automated attack tool.
>
> -Justin
>
> On Mon, Jul 22, 2013 at 5:08 AM, Russ Michaels <r...@michaels.me.uk>
> wrote:
> >
> > You can run cast function on the hex string to see the actual sql it
> > generates, which I thought was required anyway so not sure that query
> would
> > even execute otherwise.
> >
> > Russ Michaels
> > www.michaels.me.uk
> > cfmldeveloper.com
> > cflive.net
> > cfsearch.com
> > On 22 Jul 2013 04:45, "Justin Scott" <leviat...@darktech.org> wrote:
> >
> >>
> >> There was some discussion about a very similar injection on Stack
> >> Overflow which may be useful:
> >>
> >>
> >>
>
>
http://stackoverflow.com/questions/4600954/site-has-been-hacked-via-sql-inje
> ction
> >>
> >>
> >> -Justin
> >>
> >>
> >>
> >> On Sun, Jul 21, 2013 at 1:33 PM, Dave  Hatz <daveh...@hatzventures.org>
> >> wrote:
> >> >
> >> > We had someone trying to hack our system last night and I would like
> to
> >> know what he was trying to get.  Seems one of our new Junior
programmers
> >> didn't use CFQUERYPARAM and allowed this param into the query string.
> >>  Needless to say, I will be having a nice long chat with him when he
> gets
> >> into the office tomorrow.
> >> >
> >> > How do I decode what this is?  Is there a tool or site that will
> convert
> >> this for me?
> >> >
> >> > 999999.9 /*!30000union all select
> >>
>
>
0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x31303
>
>
235343830303536,0x31303235343830303536,0x31303235343830303536,0x313032353438
>
>
30303536,0x31303235343830303536,0x31303235343830303536,0x3130323534383030353
>
>
6,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x313
>
>
03235343830303536,0x31303235343830303536,0x31303235343830303536,0x3130323534
>
>
3830303536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303
>
>
536,0x31303235343830303536,0x31303235343830303536,0x31303235343830303536,0x3
> 1303235343830303536,0x31303235343830303536,0x31303235343830303536*/--
> >> >
> >> >
> >>
> >>
> >
> >
>
>
>
> 



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:356270
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm

Reply via email to