Skip to main content

Timeline for Testing a SQL injection attack

Current License: CC BY-SA 3.0

14 events
when toggle format what by license comment
Dec 9, 2013 at 16:31 comment added Your Common Sense Do you have any error reporting on?
Dec 9, 2013 at 16:26 answer added Your Common Sense timeline score: 0
Dec 9, 2013 at 16:20 history edited user2157179 CC BY-SA 3.0
updated code to PDO
Dec 9, 2013 at 15:54 history edited tadman CC BY-SA 3.0
Rephrased title to be more specific.
Dec 9, 2013 at 15:50 answer added ins0 timeline score: 0
Dec 9, 2013 at 15:48 answer added DRapp timeline score: 3
Dec 9, 2013 at 15:34 comment added Trenton Trama Since you control that file, print out the query to make sure it looks correct. If there is anything modifying $_GET (like having magic_quotes on), you'll be able to see.
Dec 9, 2013 at 15:33 comment added arkascha @NiettheDarkAbsol very clever question in this case :-)
Dec 9, 2013 at 15:33 answer added Niet the Dark Absol timeline score: 0
Dec 9, 2013 at 15:32 comment added Niet the Dark Absol Please show the exact query strings used.
Dec 9, 2013 at 15:32 comment added Your Common Sense yet another question on magic quotes... Why upvote a thousand-times-duplicate - a question.
Dec 9, 2013 at 15:31 comment added user2157179 It should be but I can't seem to hack into it, could you recommend a test line to see I can get in incase mine are incorrect?
Dec 9, 2013 at 15:30 comment added Daniel A. White that is vulnerable to sql injection.
Dec 9, 2013 at 15:29 history asked user2157179 CC BY-SA 3.0