Hello and welcome to the secure coding course. My name miss anywhere. And this is the OAS top 10 for 2013 a one injection demo on sequel injection.
This is the demo for a one injection sequel injection.
We're actually looking at a vulnerable Web application that is developed by Jeremy Durin and Adrian Crenshaw, and it's called Mattila Day.
Basically, it's a very good tool for learning various types of vulnerabilities, and it has distinct security levels, so you can test your skills.
Now for this particular demo, I'm going to demonstrate the one equals one
attack. So first, I'm gonna go ahead and log in as myself.
And then I'm going to go to the Lost 2013 a one injection the user. Look up information.
Now I'm going to purposefully have an heir message Come up on Lee because Jeremy does a very nice job of showing what the sequel statement actually looks like on the back end
inside of the air message. So let me go ahead and do that. Now,
what I'm going to do is attempt a sequel injection. Now I know that my name is valid because I'm actually logged in as myself
if I were to end that first statement with the tick
the one equals one attack I would start with or
Now, this is going to fail because my ask, you'll require some additional spaces.
But I want for you to see
what the statement actually looks like.
So if we take a look here, we can actually see the query that was sent back.
It says select star from accounts where user name is equal to Sonny. Okay, so that was
this portion is, of course, the legitimate or valid account. And I ended that with a tick.
Then I made a statement of totality stating that one equals one which we know is always true
and then that ended in a tick. Now, the reason why
this particular query fails is because I did not comment out the password portion of this statement.
Okay, not a problem. Let's go ahead and try it again,
Sonny. Tick space for
space dash, dash space.
And now my one equals one attack actually works and you can see the results have come back