noup, no se puede.. =(
LOAD DATA INFILE y SELECT INTO OUTFILE no aceptan encoding en el nombre/path del archivo..
Saludos!!
uhmmmm ... gran aporte, yo siempre me jodia en el path root, para poder hacer la inclusion me daba error y todos los videos tutos que veia eran basados con magic off. con razon =/.
buscando y buscando...
(mientras busco pego los resultados)
INTO OUTFILE %/home/z.php% works, if "%" is the field delimiting character being used. Magic quotes totally fails in that scenario.
Fuente :http://www.derkeiler.com/Mailing-Lists/securityfocus/pen-test/2007-01/msg00094.html
you can't use char() with into outfile cause there is no way to encrypt web root path.
correct. I heard some people saying it´s possible to bypass magic quotes using INTO OUTFILE but i couldn´t get closer information about this yet.
Fuente :http://forum.darkc0de.com/index.php?action=vthread&forum=8&topic=5814
Tb Encontre algo Interesante
http://www.h4cky0u.org/viewtopic.php?f=9&t=32064si tienes acceso al phpmyadmin, puedes hacer la consulta directa. un post de un tal jack.
Todos apuntan al exo que te jode la vida magic, pero que con loadfile, y con acceso remoto a la mysql, se podria hacer de todas formas. entrando direcamente con navicat u otro, o al phpmyadmin.
You can also use the load_file() command to load a .php file. If a webpage uses a MySQL Server they have to write down the password to access the MySQL in the .php File. If you load the file you will be ale to get user and pass for MySQL Server. Then you can connect to the MySQL Server and can execute MySQL commands without getting f**ked by magic quotes. Then you can spwan a shell and deface wesite if you have a user with FILE rights.
...
but you could get other users and passwords with access to mysql.user to crack the hash. Very often there are seperate users with % Host, so you could connect from every where ;)
en fin es mejor los archivos sensibles, mysql.user, crackearlos y ver si tienen mysql remoto o phpmyadmin.