Skip to main content

Questions tagged [mysql]

MySQL is an open-source relational database management system.

Filter by
Sorted by
Tagged with
-1 votes
2 answers
141 views

if mysql server is not running, is it still possible somebody gain access to my database from outside LAN (hack my database without my consent?)

I am using phpmyadmin running on xampp windows in a LAN environment. I want to find some ultimate secure solution for my database. So I am not running mysql (showing Stop in xampp control panel), is ...
John Z's user avatar
  • 1
1 vote
0 answers
115 views

MySQL Injection with a incomplete database [closed]

I have a database in which most or maybe even all columns are empty. Yet I have to gain access to the database via a user called Tom. I found out that the table is called users and the query the ...
NightOwlOnCoffee's user avatar
2 votes
1 answer
629 views

sqlmap will not save half dumped data in CSV File?

Is there any way to save half-dumped output in csv file or in table format in sqlmap? Look below image for better understanding. The target is boolean-based blind injection vulnerable. For sure, this ...
Solo's user avatar
  • 41
2 votes
1 answer
354 views

sqlmap cannot detect a confirmed vulnerability

I have a verified injection which looks like: /page/(SELECT+SLEEP(10)) But sqlmap cannot detect it no matter what. This is how I'm running sqlmap: sqlmap -u 'http://MY-SITE/page/*' --level=5 --risk=3 -...
Sohail Saha's user avatar
0 votes
0 answers
83 views

Getting around a WAF's restrictions for SQLi

I have this payload: AND SELECT SUBSTR(table_name,1,1) FROM information_schema.tables > 'A' but a WAF restricts table_name and information_schema keywords and gives a not acceptable message. Is ...
ben39's user avatar
  • 1
1 vote
1 answer
433 views

Conducting a proof-of-concept attack on an open MySQL port

I am not very experienced nor do I have acceptable knowledge, that is why I have signed up to work on a small project to gain some experience, where they don't seem to care about security much. After ...
KhodeNima's user avatar
  • 111
1 vote
0 answers
146 views

Help me securely store and retrieve Social Security numbers [closed]

I am on the very last functionality to implement before launching my app. I have the same requirements someone like Fanduel or Draftkings does. When my users cross the $600 threshold for prizes in the ...
T M's user avatar
  • 11
1 vote
1 answer
160 views

Is there a possible attack on a MySQL database using an input window [closed]

My app has an input field that is used as a source for a HTML and PDF file. I also store this input in my database. My question is: Is it possible to somehow write something in the text field which ...
VicTheWise's user avatar
0 votes
0 answers
103 views

What are password encryption schemes that result in variable length common in MySQL and PHP?

I have stumbled across passwords on a MySQL database behind a PHP webapp. Here are some examples. 753a524d56b48d825328ce27 789e0ad30d15 7ba0868c23e0a2 d327e265ca2abcd7c 48276b3d5618850 ...
knods's user avatar
  • 1
2 votes
2 answers
262 views

Can my local MySQL server be accessed without permission

I have hosted a MySQL database server on a VPS to connect to a flask web app on the same VPS. It only has users with host as local ip address. Can it be accessed by anyone else remotely, except me? If ...
Prog Techs's user avatar
1 vote
2 answers
208 views

Valid SQL Injection Syntax where same vulnerable parameter used in both a SELECT and a UPDATE statement

I have a problem and I'm hoping someone could help with a POC. In a web application, attacker controlled parameter X is used is used unsanitized in two separate SQL queries within the same function. ...
notnoodles's user avatar
0 votes
0 answers
273 views

store strings in db with asymmetric encryption for a python app keeping the data secure

I'm designing an app that receives sensitive data input from a user and that data needs to be saved securely in a database. As far as I understand it needs asymmetric encryption but since this app has ...
mic f's user avatar
  • 1
1 vote
1 answer
195 views

Need help deciphering these logs regarding YASSL attack on MySQL [closed]

I am getting the occasional message from our Fortigate Fortinet firewall, indicating that there is a yaSSL.Buffer.Overflow attack. The log from the Fortinet is: Description: Subject: attack:MySQL....
Zak's user avatar
  • 111
0 votes
1 answer
143 views

Why can I not sql inject this piece of code? [duplicate]

This is the code: $stmt = $db->prepare("SELECT DISTINCT * FROM kurssit WHERE BINARY id=? AND BINARY avain=?"); $stmt->bind_param("is", $kurssi, $avain); // prepare and bind $...
user285206's user avatar
1 vote
4 answers
977 views

Is this a safe system to authenticate users by phone number?

I'm making a Actix-web/Rust web-application where users are solely allowed to register and login with their mobile phone number. The login-screen consists of one input asking for the phone number. If ...
O'Niel's user avatar
  • 3,540

15 30 50 per page
1
2 3 4 5
35