1=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-0
 0        _                   __           __       __                      1
 1      /' \            __  /'__`\        /\ \__  /'__`\                    0
 0     /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___            1
 1     \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\           0
 0        \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/            1
 1         \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\            0
 0          \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/            1
 1                     \ \____/ >> Exploit database separated by exploit    0
 0                      \/___/          type (local, remote, DoS, etc.)     1
 1                                                                          0
 0     [x] Official Website: http://www.1337day.com                         1
 1     [x] Support E-mail  : mr.inj3ct0r[at]gmail[dot]com                   0
 0                                                                          1
 1                $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$                0
 0                I'm NuxbieCyber Member From Inj3ct0r TEAM                 1
 1                $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$                0
 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=1

 xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
     RevolutionTechnologies - SQL Injection Vulnerability   
 xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
 ./Title Exploit : RevolutionTechnologies - SQL Injection Vulnerability
 ./Vendor WebApps: RevolutionTechnologies - www.revolutiontechnologies.eu
 ./Google Dork   : inurl:"/page.php?IDMenu=" revolutiontechnologies
 ./Author Exploit: [ TheCyberNuxbie ]
 ./Category XPL  : [ WebApps/ZeroDay ]
 ./Security Risk : [ High Level ]
 ./Published XPL : June, 13 2012. 09:25 PM.
 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

 - Use it at your risk,,,
 This was written for educational purpos,,,
 Author will be not responsible for any damage. //nuxbie

 - Technical Details:
 SQL injection is a code injection technique that exploits a security
 vulnerability occurring in the database layer of an #application.
 The vulnerability is present when user input is either incorrectly
 filtered for string literal escape characters embedded in SQL #statements
 or user input is not strongly typed and thereby unexpectedly executed.
 SQL Injection vulnerability is detected in CMS (content management system).
 The vulnerability allows an attacker to inject/execute sql commands.

 - Affected items (SQLi):
 http://127.0.0.1/webapps/page.php?IDMenu=[SQLi]

 - Sample WebApps Vuln (SQLi):
 http://labsxxstems.bg/page.php?IDMenu=2' + [SQL Injection]
 http://spaxxjivot.com/page.php?IDMenu=840' + [SQL Injection]
 http://givelxnsult.com/page.php?IDMenu=33' + [SQL Injection]
 http://cox-7.euro-target.com/?IDMenu=3' + [SQL Injection]
 ,And Many More...!!!

 - Special Thanks:
 ...:::' 1337day - Inj3ct0r TEAM ':::...
 BoSs r0073r & All 31337 Member Inj3ct0r TEAM,,,
 , And All Inj3ct0r Fans & All Hacktivist,,,

 #############################################################################
 [ Inj3ct0r | PacketStromSecurity | Exploit-ID | Devilzc0de | SekuritiOnline ]
 [ Codenesia | ID-BackTrack | IndonesianCoder | IndonesianHacker | JatimCrew ]
 [ E-C-H-O | ExploreCrew | Hacker-Newbie | Jasakom | YogyaCarderLink ./etc.. ]
 -----------------------------------------------------------------------------
 [ r0073r, Sid3^effects, r4dc0re, CrosS, SeeMe, indoushka, KnocKout, ZoRLu   ]
 [ anT!-Tr0J4n, KedAns-Dz, Kalashinkov3, Angel Injection, Sammy FORGIT       ]
 [ cr4wl3r, eidelweiss, v3n0m, g3mb3lz_YCL, team_elite, NoGe, Hmei7, kaMtiEz ]
 [ cyberlog, Dencowbie, Cyberbag0r, Alex_Maxs, SeekerUnZero, AfniGates, etc. ]
               -=[ We Are c0d3rs And We Are An Exploit...!!! ]=-              
 #############################################################################