Looking through some apache logs, I've run into the following pattern several times (URL decoded):
GET /foo.php?id=1 and union select 0x5E5B7D7E,0x5E5B7D7E,0x5E5B7D7E,... --
Clearly this is an SQL injection attempt. But why the constant shown above? I can't see how it could be particularly significant, though it seems to appear quite frequently.
For what it's worth, the above constant maps to the following ASCII characters: "^[}~
", or "~}[^
" if you reverse the byte order. The value in decimal is 1,583,054,206
, in octal it's 013626676576
. The code doesn't seem to map to a useful sequence of x86 instructions.
A Google search for the number reveals simply the remnants of attempts at using the same SQL injection attack on other sites -- no information about the attack itself.
Anyone have any insight?