SQLi Hacking Challange | 1k prize
by - Thursday, January 1, 1970 at 12:00 AM
challenege accepted

\" I was nothing, I came from nothing, I got nothing, never asked for nothing. But now... Well, you watch the news. I did that. By. My. Self. The fuck did you ever do?\" -Iraq

Reply
(June 6, 2022, 01:59 AM)Rollins Wrote: i think its new way to get database that you want LOL


Lmao that's not really even my goal but we will see how this goes, if someone succeeds with the task I might hire him to dump the whole DB for me for some extra bucks. :D

@pompompurin you should also give winner the "hacker" award for some extra motivation!
Reply
You make it now public and all BF Skids "test" it now, this Vul is not long online for sure.
My kung fu is stronger than yours...


Reply
This site can’t be reached192.99.224.79 took too long to respond.
Reply
(June 6, 2022, 10:02 AM)N00b008 Wrote: This site can’t be reached192.99.224.79 took too long to respond.

Main Page over Cloudflare and Backend down as expected

coolproxies.com
Host
Error
My kung fu is stronger than yours...


Reply
The website is down unfortunately
Reply
Yeah it has been down for like 1hr already, I apologize for the shitty competition. I will probably just let Pompur to keep the money and maybe host his own challange or something.
Reply
(June 6, 2022, 11:27 AM)420 Wrote: Yeah it has been down for like 1hr already, I apologize for the shitty competition. I will probably just let Pompur to keep the money and maybe host his own challange or something.


Or give it to me :D following payload would work if waf would not block it: US' and IF(2=2,'true','false') and 55='55
Reply
(June 6, 2022, 11:39 AM)fa23fsed23 Wrote:
(June 6, 2022, 11:27 AM)420 Wrote: Yeah it has been down for like 1hr already, I apologize for the shitty competition. I will probably just let Pompur to keep the money and maybe host his own challange or something.


Or give it to me :D following payload would work if waf would not block it: US' and IF(2=2,'true','false') and 55='55


LOL

heuristic (basic) test shows that URI parameter '#1*' might be injectable (possible DBMS: 'MySQL')
heuristic (XSS) test shows that URI parameter '#1*' might be vulnerable to cross-site scripting (XSS) attacks

URI parameter '#1*' appears to be 'MySQL > 5.0.12 OR time-based blind (heavy query)' injectable 

DB is myproxylist

But now it is down and i can't go ahead ...
My kung fu is stronger than yours...


Reply
Might give this a shot, guess it isn't a simple sqlmap tho.
https://lagtra.in/socials.txt
Reply


 Users viewing this thread: SQLi Hacking Challange | 1k prize: No users currently viewing.