Blind Sql injection and SQl injection Vulnerability | Bug Bounty Poc 2023
Автор: Avosh security
Загружено: 2023-09-10
Просмотров: 1899
Описание:
Hello dear friends
Today I want to show you a program that works on a target that has a blind sql injection vulnerability.
Step 1
I extract and display the tables and data from the sql injection vulnerability method (only to see the data and compare with the data that our software extracts)
Please note that this target is vulnerable to both blind sql injection and sql injection,
but targets that are only vulnerable to blind sql injection take more time to extract a single character,
that's why we wrote this software to speed up the work go up
Step 2
is extracting the database tables by file number 1, which takes the target address as input
Step 3
We extract the information of the columns of the table in the database with file number 2, where we enter the desired address and the name of the table as input.
The last step
Data extraction is done by file number 3 and it takes the desired address, table name and desired column as input.
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: