r0oth3x49 / ghauri

An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws
MIT License
3.11k stars 310 forks source link

Bug or maybe not #141

Closed hussamtamaro closed 5 months ago

hussamtamaro commented 6 months ago

(0,CONCAT_WS(0x28,0x7e,(SELECT COUNT(*)FROM(INFORMATION_SCHEMA.TABLES)WHERE(TABLE_SCHEMA IN(0x65786368616e6765))),0x7e))

Title: MySQL >= 5.1 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (EXTRACTVALUE)

why in error based why it get tables from information schema ? if it is blocked why i don't get tables direct

r0oth3x49 commented 5 months ago

you better google things related to SQL injection that should help you more.