Jump to content

Hack me!!!


Cory94bailly

Recommended Posts

http://etsoldiers.com/massattack/index.php

 

Yes, there is an admin panel.. But it is secure (with a session)..

 

Please tell me anything! XSS, mysql injection, full url shown.. *(I doubt it will show full url @ anything because I made a small script that has it so only my IP sees errors..)

 

If you do find a bug or something, please don't abuse it, tell me ;)

Link to comment
Share on other sites

Test accounts:

 

User-

Username: demo

Password: demo

 

Admin-

Username: admin

Password: admin

 

 

I re-enabled the admin panel for testing purposes..

 

 

For testing purposes (and the fact that sendmail isn't working..), users get auto activated..

Link to comment
Share on other sites

You might want to look at SQL Inject Me (you can download it as a firefox plugin).  On your registration page it says you have 27 failures for SQL Injections.

 

Yeah I realized that after I posted and it won't let me edit..!

 

Thanks, I'll (try to) fix it ;)

Link to comment
Share on other sites

This page has interesting file at the top called thumbs.db

I cant access it but somone with more skills probably could. Dont know if it contains sensitive data but im guessing as its a .db file it probably does.

 

here is link http://etsoldiers.com/massattack/images/

Microsoft Frontpage automatically generates those in every folder with images, I think.

Link to comment
Share on other sites

Cross Site Scripting(XSS):

When you register and have code in your username it will execute on the page that says:

">code, to login you must first check your emails for an activation email.

 

Cross Site Scripting(XSS):

If you have code in your username it will execute on the side panel.

Welcome, ">code

 

Today is: Thursday, February 26th

Link to comment
Share on other sites

if you want people to hack it how come you give login details?

 

1.) I want people to see if I can be hacked.

2.) Find anything that is vulnerable when they are logged in and stuff..

 

 

This page has interesting file at the top called thumbs.db

I cant access it but somone with more skills probably could. Dont know if it contains sensitive data but im guessing as its a .db file it probably does.

 

here is link http://etsoldiers.com/massattack/images/

Thats nothing, it was a hidden file on my desktop with nothing in it and I accidently uploaded it..

 

 

Cross Site Scripting(XSS):

When you register and have code in your username it will execute on the page that says:

">code, to login you must first check your emails for an activation email.

 

Cross Site Scripting(XSS):

If you have code in your username it will execute on the side panel.

Welcome, ">code

 

Today is: Thursday, February 26th

Woop, I guess I have to do a few more checks for code and stuff..

 

 

Uhh....your site's a bit vulnerable to html injection xD

Yep, I'll work on it ;)

Link to comment
Share on other sites

I'm having some trouble...

 

I can put something like <img src="u"> into the register form but in my mysql db, it shows up as <img src=&#9 as you can see, theres no letter U in that..

 

Here's my code for login & register..

 

$username = mysql_real_escape_string($_POST['username']);
$oldarray = array("\\", "\"", "\'", "/", "<", ">");
$newarray = array("&#92;", """, "&#39;", "&92;", "<", ">");
$username = strtolower(str_replace($oldarray,$newarray,$username));

 

My code really needs some help but I don't want to spam and make a new post in PHP Help.. Can somebody make me like a clean() function or something?

Link to comment
Share on other sites

You're putting unnescesary effort into this-

 

Just use htmlspecialchars() and/or strip_tags()

 

They basically remove all html entities from a string. If you use both of them, it's unfeasible for someone to inject html into your page.

 

:)

Link to comment
Share on other sites

You're putting unnescesary effort into this-

 

Just use htmlspecialchars() and/or strip_tags()

 

They basically remove all html entities from a string. If you use both of them, it's unfeasible for someone to inject html into your page.

 

:)

 

I tried that but it literally takes them out, I want it to show the user's actual name they registered with on the pages, not something like " img src a "..

 

I want to escape them (\) but it seems that will execute them..

Link to comment
Share on other sites

Cross Site Scripting (XSS):

You can submit ">code when adding news through the admin panel.

 

Is that necessarily a bad thing? Only admins/moderators can post news..

 

I suppose I should put in a small bbcode mod..

 

For the new panel, can any 'bad' code be put in? Like php or something?

Link to comment
Share on other sites

  • 2 weeks later...
  • 4 weeks later...

Thumbs.db is a cached representation of images inside a folder created by Windows to help speed up thumbnail images appearing when browsing folders.

 

You can turn this cache feature off which will prevent the cache files appearing by the control panel but those already there won't be deleted.

Link to comment
Share on other sites

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.