Current time: 05-29-2025, 10:52 AM Hello There, Guest! (LoginRegister)


Post Reply 
exploit
Author Message
ephigenie Offline
Project Leader
*******
Administrators

Posts: 1,578
Joined: Oct 2006
Reputation: 15
Post: #3
RE: exploit
mh.

yeah we'll see that we test if the value is present and if not append it in the [mysqld] section. lets see how we can do that.

But after all it should be clear that this kind of information gathering is only possible if the attackers has a valid mysql account - or has found a method to inject malicious code into installed php applications (i.e. phpbb 2.x and so on are good candidates for such things )
(This post was last modified: 07-22-2008 12:27 AM by ephigenie.)
07-22-2008 12:23 AM
Visit this user's website Find all posts by this user Quote this message in a reply
Post Reply 


Messages In This Thread
exploit - sci2tech - 07-16-2008, 09:06 PM
RE: exploit - aseques - 07-22-2008, 12:19 AM
RE: exploit - ephigenie - 07-22-2008 12:23 AM
RE: exploit - aseques - 07-22-2008, 12:29 AM
RE: exploit - ephigenie - 07-22-2008, 12:31 AM
RE: exploit - FeG - 07-24-2008, 07:08 AM

Forum Jump:


User(s) browsing this thread: 1 Guest(s)