Follow us on Twitter!
Ideas are far more powerful than guns.
Wednesday, April 23, 2014
Navigation
Home
HellBoundHackers Main:
HellBoundHackers Find:
HellBoundHackers Information:
Learn
Communicate
Submit
Shop
Challenges
HellBoundHackers Exploit:
HellBoundHackers Programming:
HellBoundHackers Think:
HellBoundHackers Track:
HellBoundHackers Patch:
HellBoundHackers Other:
HellBoundHackers Need Help?
Other
Members Online
Total Online: 25
Guests Online: 18
Members Online: 7

Registered Members: 82881
Newest Member: DARKLECTER
Latest Articles
View Thread

HellBound Hackers | Challenges | Patching

Author

patching 2


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 04-11-06 22:06
im going insane over this one, im pretty definate that the vulnerable line is line 6($id=$_GET['id']; ) and that the function is addslashes. the exploit type is SQL injection im sure(delete the above if its a spoiler) and it doesnt work. ive tried mysql_real_escape_string too :/ someone please point me in the right direction


Author

RE: patching 2


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 11-11-06 15:53
i'll give you a hint, as soon as you come online on msn Pfft i solved it 2 minutes ago!


Author

RE: patching 2


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 11-11-06 15:56
EDIT:
Sorry for the doublepost!




Edited by on 11-11-06 15:57
Author

RE: patching 2


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 06-04-07 14:26
I need a help too with this challenge, i know i'm right but it doesn't work
Author

RE: patching 2


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 06-04-07 17:09
just PM me and I'll help whoever needs it Smile