root
Welcome to Ubuntu 24.04.2 LTS (GNU/Linux 6.8.0-187-generic x86_64)


  System load:  0.01%                Processes:             48726
  Usage of /:   0.34% of 298.49TB     Users logged in:       219
  Memory usage: 9%                 IP address for eth0:   10.10.201.11
  Swap usage:   17%


0 packages can be updated.
0 security updates available.
Articulating Splines... Please Wait sqlmap -u "http://10.10.201.11/?p=1&forumaction=search" --dbs [*] starting       ___       __H__  ___ ___[']_____ ___ ___  {1.8.4.5#dev} |_ -| . [']     | .'| . | |___|_ ["]_|_|_|__,|  _|      |_|V...       |_|   https://sqlmap.org [12:34:58] [INFO] testing if GET parameter 'id' is injectable [12:34:59] [INFO] GET parameter 'id' appears to be 'AND boolean-based blind - WHERE or HAVING clause' injectable [12:35:00] [INFO] the back-end DBMS is MySQL bash: SELECT * from userinfo where username=&'& form(usr) &'& AND password=&'& form(pwd) &'& then login.asp else BadLogin.asp (Post to viewport) bash: -c ./ethicalHacker bash: ./ethicalHacker: No such file or directory bash: ';exec master..xp_cmdshell "echo YOU ARE HACKED > c:\inetpub\wwwroot\default.htm";-- ERROR (not really), NOTICE: We are currently twirling our thumbs, reminiscing on the good'ol'days, the wild wild west of the internet days, post Commodore 64, Amiga, and the Intel i386. Feel free stay here and wait, your browser will auto refresh when we come back online. -SEC Dynamics, LLC -SECURITY . ENGINEERING . CONSULTING exit data exfiltration complete.