Read htaccess file through Blind SQL injection - Security Art Work
Tags
attack-pattern: | Data Server - T1583.004 Server - T1584.004 Tool - T1588.002 Vulnerabilities - T1588.006 |
Common Information
Type | Value |
---|---|
UUID | ad2b21a4-5aaa-4cbb-95e1-e9ccde6536c0 |
Fingerprint | b7aad9142f25d7a0 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | June 4, 2014, 8:05 a.m. |
Added to db | Jan. 18, 2023, 11:40 p.m. |
Last updated | Nov. 17, 2024, 11:40 p.m. |
Headline | Read htaccess file through Blind SQL injection |
Title | Read htaccess file through Blind SQL injection - Security Art Work |
Detected Hints/Tags/Attributes | 18/1/10 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 57 | www.owasp.org |
|
Details | Domain | 17 | sqlmap.org |
|
Details | Domain | 29 | sqlmap.py |
|
Details | Domain | 1 | vulnerable.website |
|
Details | Domain | 3 | wiki.apache.org |
|
Details | File | 1206 | index.php |
|
Details | File | 29 | sqlmap.py |
|
Details | Url | 1 | https://www.owasp.org/index.php/blind_sql_injection |
|
Details | Url | 1 | http://vulnerable.website |
|
Details | Url | 1 | http://wiki.apache.org/httpd/distrosdefaultlayout. |