This is a functional SQL injection exploit targeting a vulnerable ASP script (`big.asp`). It demonstrates how to extract user credentials (e.g., `user_pass`, `user_name`) via a UNION-based attack.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:Custom ASP application (big.asp)
No auth needed
Prerequisites:Access to the vulnerable endpoint (`/enq/big.asp?id=`) · SQL injection vulnerability in the `id` parameter