What are password encryption schemes that result in variable length common in MySQL and PHP?

I have stumbled across passwords on a MySQL database behind a PHP webapp. Here are some examples.
753a524d56b48d825328ce27
789e0ad30d15
7ba0868c23e0a2
d327e265ca2abcd7c
48276b3d5618850
bffaa9b3ba92ffc3
21614da133d56e72857c
44d2059e642f9733… Continue reading What are password encryption schemes that result in variable length common in MySQL and PHP?

Can you perform a penetration test on a web application that is running on local host and using an XAMPP server? [closed]

I created a basic website that includes a login and signup system. The website uses a mySQL server as the backend to store login information. I want to use Kali Linux to perform a white box test on it as a project for class.
Is this even p… Continue reading Can you perform a penetration test on a web application that is running on local host and using an XAMPP server? [closed]

Valid SQL Injection Syntax where same vulnerable parameter used in both a SELECT and a UPDATE statement

I have a problem and I’m hoping someone could help with a POC.
In a web application, attacker controlled parameter X is used is used unsanitized in two separate SQL queries within the same function.
The first query is a SELECT statement of… Continue reading Valid SQL Injection Syntax where same vulnerable parameter used in both a SELECT and a UPDATE statement