root
Welcome to Ubuntu 24.04.2 LTS (GNU/Linux 6.8.0-187-generic x86_64)
System load: 0.01% Processes: 48726
Usage of /: 0.34% of 298.49TB Users logged in: 219
Memory usage: 9% IP address for eth0: 10.10.201.11
Swap usage: 17%
0 packages can be updated.
0 security updates available.
Articulating Splines... Please Wait
sqlmap -u "http://10.10.201.11/?p=1&forumaction=search" --dbs
[*] starting
___
__H__
___ ___[']_____ ___ ___ {1.8.4.5#dev}
|_ -| . ['] | .'| . |
|___|_ ["]_|_|_|__,| _|
|_|V... |_| https://sqlmap.org
[12:34:58] [INFO] testing if GET parameter 'id' is injectable
[12:34:59] [INFO] GET parameter 'id' appears to be 'AND boolean-based blind - WHERE or HAVING clause' injectable
[12:35:00] [INFO] the back-end DBMS is MySQL
bash: SELECT * from userinfo where username=&'& form(usr) &'& AND password=&'& form(pwd) &'& then login.asp else BadLogin.asp (Post to viewport)
bash: -c ./ethicalHacker
bash: ./ethicalHacker: No such file or directory
bash: ';exec master..xp_cmdshell "echo YOU ARE HACKED > c:\inetpub\wwwroot\default.htm";--
ERROR (not really), NOTICE: We are currently twirling our thumbs, reminiscing on the good'ol'days, the wild wild west of the internet days, post Commodore 64, Amiga, and the Intel i386.
Feel free stay here and wait, your browser will auto refresh when we come back online.
-SEC Dynamics, LLC
-SECURITY . ENGINEERING . CONSULTING
exit
data exfiltration complete.