2. Mapping cybersecurity

New post

Your email address will not be published. Required fields are marked *

40 posts
Collapse posts

555-1) OR 698=(SELECT 698 FROM PG_SLEEP(15))–

1’||DBMS_PIPE.RECEIVE_MESSAGE(CHR(98)||CHR(98)||CHR(98),15)||’

1*DBMS_PIPE.RECEIVE_MESSAGE(CHR(99)||CHR(99)||CHR(99),15)

1jjP7C5xF’)) OR 990=(SELECT 990 FROM PG_SLEEP(15))–

1mblJxd2L’) OR 636=(SELECT 636 FROM PG_SLEEP(15))–

1oglDRgR6′ OR 495=(SELECT 495 FROM PG_SLEEP(15))–

1-1)) OR 539=(SELECT 539 FROM PG_SLEEP(15))–

5550’XOR(555*if(now()=sysdate(),sleep(15),0))XOR’Z

1-1) OR 796=(SELECT 796 FROM PG_SLEEP(15))–

1-1 OR 607=(SELECT 607 FROM PG_SLEEP(15))–

1bLjr8JEq’; waitfor delay ‘0:0:15’ —

1-1 waitfor delay ‘0:0:15’ —

1-1); waitfor delay ‘0:0:15’ —

1-1; waitfor delay ‘0:0:15’ —