Quote:
Originally Posted by mayjune View Post
these things don't work anymore, aleast all the sites that i tried on, maybe in combination of some other attack it might work, but alone this just doesnt worked for me....
thanks...
I just don't know how you did it but there are many sites that are vulnerable to SQL injection. Moreover, you need many variations in order to bypass filterings so if you copy and try what I have written that may not work but if you are pretty good with SQL, you will know how it is going on and you can successfully SQL inject.
Example sites vulnerable to SQLi:
Code: links
rgipt.in/mediareleases/media_release_detail.php?id=133
mariupol.in/top/stat.php?id=1&act=dir
christuniversity.in/msgdisplay.php?id=7
infomedia18.in/template.php?id=132
In fact, so many sites are vulnerable to SQLi. And also, nowadays, the open source projects are getting better and better and normal SQLi might not work. Also, the projects such as Suhosin and Hardened PHP projects are adding better security. Similarly, many servers filter the unnecessary things from the HTTP requests.