Because of vulnerability of site in Company A, database which contains user’s information was leaked. The file is dumped packet at the moment of attacking.
Find the administrator’s account information which was leaked from the site.
For reference, some parts of the packet was blind to XXXX.
Answer : strupr(md5(database_name|table_name|decode(password_of_admin)))
(‘|’is just a character)
Download : 80924D4296FCBE81EA5F09CF60542AE7
Net400 featured a network packet capture of a blind SQL injection attack with task to extract some info and bruteforce a bit.
Continue reading