Looking through several apache logs, I ran the following pattern several times (URL decryption):
GET /foo.php?id=1 and union select 0x5E5B7D7E,0x5E5B7D7E,0x5E5B7D7E,... --
Obviously, this is an attempt at SQL injection. But why is the constant shown above? I do not see how this can be particularly significant, although it seems that it appears quite often.
For what it's worth, the above constant displays the following ASCII characters: " ^[}~ " or " ~}[^ " if you reverse the byte order. The value in decimal value is 1,583,054,206 , in octal 013626676576 - 013626676576 . The code does not seem to match the useful x86 instruction sequence.
A Google search simply shows the remnants of attempts to use the same SQL injection attack on other sites - no information about the attack itself.
Does anyone have an understanding?
security sql sql-injection
tylerl
source share