Wrote an exploit for it.. I neve expected the 1' union select password from user \* would try to actually parse the password as a column.. Anyway the code below did the trick.. (Takes some time as it bruteforces)
Well seems I can't include the code without generating a 500 error.
Search found 1 match
- Fri Jul 03, 2009 7:09 pm
- Forum: Challenges Solved
- Topic: Forced Entry
- Replies: 17
- Views: 1625