Timeline for Testing a SQL injection attack
Current License: CC BY-SA 3.0
14 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| Dec 9, 2013 at 16:31 | comment | added | Your Common Sense | Do you have any error reporting on? | |
| Dec 9, 2013 at 16:26 | answer | added | Your Common Sense | timeline score: 0 | |
| Dec 9, 2013 at 16:20 | history | edited | user2157179 | CC BY-SA 3.0 | updated code to PDO |
| Dec 9, 2013 at 15:54 | history | edited | tadman | CC BY-SA 3.0 | Rephrased title to be more specific. |
| Dec 9, 2013 at 15:50 | answer | added | ins0 | timeline score: 0 | |
| Dec 9, 2013 at 15:48 | answer | added | DRapp | timeline score: 3 | |
| Dec 9, 2013 at 15:34 | comment | added | Trenton Trama | Since you control that file, print out the query to make sure it looks correct. If there is anything modifying $_GET (like having magic_quotes on), you'll be able to see. | |
| Dec 9, 2013 at 15:33 | comment | added | arkascha | @NiettheDarkAbsol very clever question in this case :-) | |
| Dec 9, 2013 at 15:33 | answer | added | Niet the Dark Absol | timeline score: 0 | |
| Dec 9, 2013 at 15:32 | comment | added | Niet the Dark Absol | Please show the exact query strings used. | |
| Dec 9, 2013 at 15:32 | comment | added | Your Common Sense | yet another question on magic quotes... Why upvote a thousand-times-duplicate - a question. | |
| Dec 9, 2013 at 15:31 | comment | added | user2157179 | It should be but I can't seem to hack into it, could you recommend a test line to see I can get in incase mine are incorrect? | |
| Dec 9, 2013 at 15:30 | comment | added | Daniel A. White | that is vulnerable to sql injection. | |
| Dec 9, 2013 at 15:29 | history | asked | user2157179 | CC BY-SA 3.0 |